Computer Network Articles

Page 66 of 122

What is a Shielded Twisted Pair (STP) cable?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 05-Nov-2021 5K+ Views

Shielded Twisted PairIBM invented the shielded twisted pair (STP) cable for token ring networks, including two independent wires coated in a foil shielding that prevents electromagnetic interference and speeds up data transmission.STP cables are protected with additional foil or copper knitting jackets to help protect cable signals from interference.STP cables are more expensive than UTP cables but can transmit data at higher prices over longer distances.Electromagnetic interference does not seep out of or into STP cable because of the additional coverageEthernet networks, particularly fast-data-rate Ethernets, frequently use STP cables.The efficiency of the additional covering depends on the following features of ...

Read More

What is Multiple Spanning Tree Protocol (MSTP)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 05-Nov-2021 2K+ Views

Multiple Spanning Tree ProtocolMultiple Spanning Tree Protocol (MSTP) is an algorithm that enables easy and full connectivity provided to any Virtual LAN (VLAN) across an Integrated Area Network.MSTP uses Bridge Protocol Data Units (BPDUs) to transmit information to tree-related devices by identifying practical ways to prevent loopholes in the MSTI (Multiple Spanning Tree Instance) and CIST (Common and Internal Spanning Tree). This is done in the same way as the STP was designed, but without the need to enable support links and without the risk of bridge loops.In addition, MSTP allows frames/packets allocated to different VLANs to take different routes ...

Read More

Difference between RIP and OSPF

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 05-Nov-2021 6K+ Views

Routing Information Protocol (RIP)The Routing Information Protocol (RIP), which uses the hop count as a routing measure, is one of the oldest distance-vector routing technologies. RIP eliminates routing loops by restricting the number of hops permitted in a path from source to destination.RIP permits a maximum of 15 hops, which limits the size of networks that can be supported by the protocol.It also employs split horizon, route poisoning, and hold-down techniques to restrict the spread of incorrect routing information.RIP is not the preferred routing protocol in most networking setups since its time to converge, and scalability is inferior to EIGRP; ...

Read More

What is Advanced Peer-to-Peer Networking (APPN)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 05-Nov-2021 621 Views

Peer-to-Peer NetworkingPeer-to-peer computing, also known as peer-to-peer networking, is a shared application development that separates tasks or peer-to-peer workloads.Peers are participants in the application who have the same opportunity and are similarly capable. They are supposed to create a peer-to-peer node network.A collection of computers is joined together with equal permissions and responsibilities for data processing in peer-topeer (P2P) networking.In contrast to traditional client-server networking, no device in a P2P network is wholly dedicated to serving or receiving data.Advanced Peer-to-Peer Networking (APPN)The IBM Systems Network Architecture (SNA) includes Advanced Peer to-Peer Networking (APPN). It entails protocols that allow computers to ...

Read More

Difference between DropBox and BorgBase

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 05-Nov-2021 199 Views

DropBoxDropbox is a cloud storage file, synchronization, personal cloud, and client software provided by Dropbox, Inc. Dropbox is an American Corporation headquartered in San Francisco, California. It was created as a start-up company in 2007 by Drew Houston and Arash Ferdowsi, students from MIT. They work on practically all platforms, such as Windows, Mac OS, iOS, Android, and web browsers.The cloud service marketplace is projected to grow in popularity as individuals seek to access their digital information from several locations and devices. DropBox is credited with inventing the storage cloud concept, but it now faces competition.Following are some of the ...

Read More

Advantages and Disadvantages of Subnetting

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 05-Nov-2021 6K+ Views

What is Subnetting?Subnetting is a process of separating a single physical network into several logical subnetworks (subnets).A network segment and a host segment make up an IP address subnets formed by extracting bits from an IP address's host component and establishing several smaller sub-networks within a more extensive network.Subnetting enables a business to expand its network without securing a new network number from its Internet Service Provider (ISP). Subnetting reduces network traffic while also hiding network complexity.Subnetting is required when a single network number must be distributed across multiple parts of a local area network.Subnets were created to alleviate the ...

Read More

Use of Callbacks in Layered Architecture

Ayushi Bhargava
Ayushi Bhargava
Updated on 28-Oct-2021 513 Views

Layered ArchitectureA layered architecture splits a system into many groups, each of which contains code that addresses a specific issue area, and these groups are referred to as layers.The majority of enterprise-level apps have a three-layer high-level application architecture.The Presentation layerThe Business layerThe Persistence layerWhat is a Callback?A callback, sometimes known as a "call-after" function in computer programming, is any executable code that is supplied as an argument to other code, with the expectation that the other code will call back (execute) the input at a specific time. This execution can take place at once, as in a synchronous callback, ...

Read More

Types of Wireless and Mobile Device Attacks

Ayushi Bhargava
Ayushi Bhargava
Updated on 28-Oct-2021 2K+ Views

SMiShingWith the widespread usage of cellphones, smishing has grown more prevalent. Short Message Service (SMS) is used by SMiShing to transmit fraudulent text messages or links. By calling, the crooks deceive the user. Victims may provide sensitive information like credit card numbers, account numbers, and so on. When a user visits a website, he or she may unwittingly download malware that infects the device.War DrivingWar driving is a method employed by attackers to locate entrance points wherever they are. They may drive about and acquire a massive quantity of information in a short period of time because of the availability ...

Read More

TCP Client-Server Program to Check if a Given String is a Palindrome

Ayushi Bhargava
Ayushi Bhargava
Updated on 28-Oct-2021 2K+ Views

A Palindrome is a word, phrase, or sequence that reads the same backward as forward, e.g., "madam" or "nurses run".TCP Client-Server ProgramClient and server configuration in which a client connects transmits a string to the server, and the server displays the original string and sends a confirmation to the client through socket connection whether the string is a palindrome or not.Input − WOWOutput − PalindromeInput − soapOutput − Not PalindromeHow Does It Work?First, establish a client-server connection.After the connection is established, the client utilizes the send system function to deliver the user input string to the server.The server will wait ...

Read More

TCP and UDP in Transport Layer

Ayushi Bhargava
Ayushi Bhargava
Updated on 28-Oct-2021 3K+ Views

Layer 3 or the Network layer employs IP, or Internet Protocol, which is a connectionless protocol that processes each packet independently, resulting in a lack of transmission dependability. When data is transmitted from one host to another, each packet, even though it belongs to the same session, may travel a distinct path. This implies that the packets could or might not arrive in the correct order. As a result, IP’s dependability is reliant on higher-layer protocols.Transmission Control Protocol (TCP)TCP is a protocol that allows data to be sent from one computer to another. TCP is a layer 4 protocol that ...

Read More
Showing 651–660 of 1,219 articles
« Prev 1 64 65 66 67 68 122 Next »
Advertisements