Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Network Articles
Page 66 of 122
What is a Shielded Twisted Pair (STP) cable?
Shielded Twisted PairIBM invented the shielded twisted pair (STP) cable for token ring networks, including two independent wires coated in a foil shielding that prevents electromagnetic interference and speeds up data transmission.STP cables are protected with additional foil or copper knitting jackets to help protect cable signals from interference.STP cables are more expensive than UTP cables but can transmit data at higher prices over longer distances.Electromagnetic interference does not seep out of or into STP cable because of the additional coverageEthernet networks, particularly fast-data-rate Ethernets, frequently use STP cables.The efficiency of the additional covering depends on the following features of ...
Read MoreWhat is Multiple Spanning Tree Protocol (MSTP)?
Multiple Spanning Tree ProtocolMultiple Spanning Tree Protocol (MSTP) is an algorithm that enables easy and full connectivity provided to any Virtual LAN (VLAN) across an Integrated Area Network.MSTP uses Bridge Protocol Data Units (BPDUs) to transmit information to tree-related devices by identifying practical ways to prevent loopholes in the MSTI (Multiple Spanning Tree Instance) and CIST (Common and Internal Spanning Tree). This is done in the same way as the STP was designed, but without the need to enable support links and without the risk of bridge loops.In addition, MSTP allows frames/packets allocated to different VLANs to take different routes ...
Read MoreDifference between RIP and OSPF
Routing Information Protocol (RIP)The Routing Information Protocol (RIP), which uses the hop count as a routing measure, is one of the oldest distance-vector routing technologies. RIP eliminates routing loops by restricting the number of hops permitted in a path from source to destination.RIP permits a maximum of 15 hops, which limits the size of networks that can be supported by the protocol.It also employs split horizon, route poisoning, and hold-down techniques to restrict the spread of incorrect routing information.RIP is not the preferred routing protocol in most networking setups since its time to converge, and scalability is inferior to EIGRP; ...
Read MoreWhat is Advanced Peer-to-Peer Networking (APPN)?
Peer-to-Peer NetworkingPeer-to-peer computing, also known as peer-to-peer networking, is a shared application development that separates tasks or peer-to-peer workloads.Peers are participants in the application who have the same opportunity and are similarly capable. They are supposed to create a peer-to-peer node network.A collection of computers is joined together with equal permissions and responsibilities for data processing in peer-topeer (P2P) networking.In contrast to traditional client-server networking, no device in a P2P network is wholly dedicated to serving or receiving data.Advanced Peer-to-Peer Networking (APPN)The IBM Systems Network Architecture (SNA) includes Advanced Peer to-Peer Networking (APPN). It entails protocols that allow computers to ...
Read MoreDifference between DropBox and BorgBase
DropBoxDropbox is a cloud storage file, synchronization, personal cloud, and client software provided by Dropbox, Inc. Dropbox is an American Corporation headquartered in San Francisco, California. It was created as a start-up company in 2007 by Drew Houston and Arash Ferdowsi, students from MIT. They work on practically all platforms, such as Windows, Mac OS, iOS, Android, and web browsers.The cloud service marketplace is projected to grow in popularity as individuals seek to access their digital information from several locations and devices. DropBox is credited with inventing the storage cloud concept, but it now faces competition.Following are some of the ...
Read MoreAdvantages and Disadvantages of Subnetting
What is Subnetting?Subnetting is a process of separating a single physical network into several logical subnetworks (subnets).A network segment and a host segment make up an IP address subnets formed by extracting bits from an IP address's host component and establishing several smaller sub-networks within a more extensive network.Subnetting enables a business to expand its network without securing a new network number from its Internet Service Provider (ISP). Subnetting reduces network traffic while also hiding network complexity.Subnetting is required when a single network number must be distributed across multiple parts of a local area network.Subnets were created to alleviate the ...
Read MoreUse of Callbacks in Layered Architecture
Layered ArchitectureA layered architecture splits a system into many groups, each of which contains code that addresses a specific issue area, and these groups are referred to as layers.The majority of enterprise-level apps have a three-layer high-level application architecture.The Presentation layerThe Business layerThe Persistence layerWhat is a Callback?A callback, sometimes known as a "call-after" function in computer programming, is any executable code that is supplied as an argument to other code, with the expectation that the other code will call back (execute) the input at a specific time. This execution can take place at once, as in a synchronous callback, ...
Read MoreTypes of Wireless and Mobile Device Attacks
SMiShingWith the widespread usage of cellphones, smishing has grown more prevalent. Short Message Service (SMS) is used by SMiShing to transmit fraudulent text messages or links. By calling, the crooks deceive the user. Victims may provide sensitive information like credit card numbers, account numbers, and so on. When a user visits a website, he or she may unwittingly download malware that infects the device.War DrivingWar driving is a method employed by attackers to locate entrance points wherever they are. They may drive about and acquire a massive quantity of information in a short period of time because of the availability ...
Read MoreTCP Client-Server Program to Check if a Given String is a Palindrome
A Palindrome is a word, phrase, or sequence that reads the same backward as forward, e.g., "madam" or "nurses run".TCP Client-Server ProgramClient and server configuration in which a client connects transmits a string to the server, and the server displays the original string and sends a confirmation to the client through socket connection whether the string is a palindrome or not.Input − WOWOutput − PalindromeInput − soapOutput − Not PalindromeHow Does It Work?First, establish a client-server connection.After the connection is established, the client utilizes the send system function to deliver the user input string to the server.The server will wait ...
Read MoreTCP and UDP in Transport Layer
Layer 3 or the Network layer employs IP, or Internet Protocol, which is a connectionless protocol that processes each packet independently, resulting in a lack of transmission dependability. When data is transmitted from one host to another, each packet, even though it belongs to the same session, may travel a distinct path. This implies that the packets could or might not arrive in the correct order. As a result, IP’s dependability is reliant on higher-layer protocols.Transmission Control Protocol (TCP)TCP is a protocol that allows data to be sent from one computer to another. TCP is a layer 4 protocol that ...
Read More