- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1625 Articles for Computer Network
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
4K+ Views
Shielded Twisted PairIBM invented the shielded twisted pair (STP) cable for token ring networks, including two independent wires coated in a foil shielding that prevents electromagnetic interference and speeds up data transmission.STP cables are protected with additional foil or copper knitting jackets to help protect cable signals from interference.STP cables are more expensive than UTP cables but can transmit data at higher prices over longer distances.Electromagnetic interference does not seep out of or into STP cable because of the additional coverageEthernet networks, particularly fast-data-rate Ethernets, frequently use STP cables.The efficiency of the additional covering depends on the following features of ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
2K+ Views
Multiple Spanning Tree ProtocolMultiple Spanning Tree Protocol (MSTP) is an algorithm that enables easy and full connectivity provided to any Virtual LAN (VLAN) across an Integrated Area Network.MSTP uses Bridge Protocol Data Units (BPDUs) to transmit information to tree-related devices by identifying practical ways to prevent loopholes in the MSTI (Multiple Spanning Tree Instance) and CIST (Common and Internal Spanning Tree). This is done in the same way as the STP was designed, but without the need to enable support links and without the risk of bridge loops.In addition, MSTP allows frames/packets allocated to different VLANs to take different routes ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
4K+ Views
Routing Information Protocol (RIP)The Routing Information Protocol (RIP), which uses the hop count as a routing measure, is one of the oldest distance-vector routing technologies. RIP eliminates routing loops by restricting the number of hops permitted in a path from source to destination.RIP permits a maximum of 15 hops, which limits the size of networks that can be supported by the protocol.It also employs split horizon, route poisoning, and hold-down techniques to restrict the spread of incorrect routing information.RIP is not the preferred routing protocol in most networking setups since its time to converge, and scalability is inferior to EIGRP; ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
2K+ Views
A virtual circuit (VC) transfers data via a packet-switched network that makes it look like the source and destination end systems of the data are connected by a dedicated physical link. The terms "virtual circuit" and "virtual connection" are interchangeable.A "call setup" must be established between two or more nodes or software programs before a connection or virtual circuit can be used.A bit stream or byte stream may then be sent between the nodes. As a result, a virtual circuit protocol permits higher-level protocols to avoid dealing with data division into Protocol data units.This network is a very dependable means ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
375 Views
Peer-to-Peer NetworkingPeer-to-peer computing, also known as peer-to-peer networking, is a shared application development that separates tasks or peer-to-peer workloads.Peers are participants in the application who have the same opportunity and are similarly capable. They are supposed to create a peer-to-peer node network.A collection of computers is joined together with equal permissions and responsibilities for data processing in peer-topeer (P2P) networking.In contrast to traditional client-server networking, no device in a P2P network is wholly dedicated to serving or receiving data.Advanced Peer-to-Peer Networking (APPN)The IBM Systems Network Architecture (SNA) includes Advanced Peer to-Peer Networking (APPN). It entails protocols that allow computers to ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
261 Views
End-to-End EncryptionEnd-to-End Encryption (E2EE) is a secure communication method that prevents third-parties from accessing data. At the same time, the data is being transferred from one end of the device to another.In E2EE, data is encrypted in the sender system or device, and only the intended recipient can remove it from encryption.The message will not be read or interrupted by an Internet Service Provider (ISP), application service provider, attacker, or any other organization or service on its way to the destination.Many messaging providers use end-to-end encryption, and some of these providers face controversy over their decision to accept E2EE.The technology ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
80 Views
DropBoxDropbox is a cloud storage file, synchronization, personal cloud, and client software provided by Dropbox, Inc. Dropbox is an American Corporation headquartered in San Francisco, California. It was created as a start-up company in 2007 by Drew Houston and Arash Ferdowsi, students from MIT. They work on practically all platforms, such as Windows, Mac OS, iOS, Android, and web browsers.The cloud service marketplace is projected to grow in popularity as individuals seek to access their digital information from several locations and devices. DropBox is credited with inventing the storage cloud concept, but it now faces competition.Following are some of the ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
243 Views
Origin of CryptographyAll great civilizations have strived to send communications in a secure manner. Only the Mesopotamians, ancient Greeks, ancient Chinese, and Spartans utilized encryption to keep their transmissions secret. Though these civilizations utilized advanced cryptography at the time, they were not impenetrable. Throughout the years, cryptography has progressed to a point where our brains are unable to decipher it on their own anymore.As of now, quantum cryptography is the most sophisticated kind of encryption that exists. Although Stephen Wiesner initially proposed it in the 1970s, it was first published in 1983. It's no secret that quantum cryptography is a ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
707 Views
What is Cache?A cache is a data storage mechanism that allows users to retrieve data or files on computers quickly.Caches can be found in both hardware and software. Caching reduces data access latency by acting as an intermediary between the primary storage appliance and the receiver hardware or software device.A cache provides similar capabilities in both hardware and software. It's a type of internal memory with a tiny form factor that saves instances of the most frequently executed programs in main memory for faster access when the CPU needs them in physical or hardware form.We are all familiar with the ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
323 Views
What is Cybersecurity?Before we can understand what cybersecurity is and what types of risks and vulnerabilities it contains, we must first comprehend the cyberspace. The term "cyberspace" refers to a collection of communication networks, databases, embedded processors, the internet, and controllers used to exchange electronic documents. Telephone wires, coaxial cables, electromagnetic waves, and fiber-optic connections create a global network environment.Though cyberspace and the Internet are sometimes used interchangeably, the Internet is actually a part of cyberspace. To put it another way, cyberspace is a networked Internet environment.Cyber-security can be defined as the process of defending cyberspace from assault, abuse, harm, ... Read More