- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1112 Articles for Internet
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Cable television (TV) networks have been used for data transfer in the past. Cable TV networks were initially designed to transmit television signals, but they have also been used to provide internet access and other types of data transfer services. This is typically done using a technology called "cable modem, " which allows data to be sent over the same cable that is used to transmit TV signals. Cable TV companies often provide internet service through cable modems as part of a bundle that includes TV and telephone services. Cable modem internet service is generally faster than DSL and has ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
3K+ Views
Bus Topology In computer networking, a bus topology is a network architecture in which devices are connected to a common cable called the bus or backbone. The bus is a single cable that runs the length of the network and to which all devices connect. Data transmitted on the bus is sent to all devices connected to it, but only the intended recipient actually receives and processes the data. One of the main advantage of bus topology is that it is simple and inexpensive to implement, as only a single cable is needed to connect all devices. The main disadvantage ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
5K+ Views
Buffering refers to the process of temporarily storing data in memory (a buffer) before it is sent or received over a network. The buffer helps to smooth out any variations in the rate at which data can be sent or received, and ensures that the sender and receiver can work at their own pace without interruption. For example, when streaming a video, the video player may buffer some of the video before it starts playing. This is done so that if the network connection is slow, the video can continue playing without interruption. Similarly, when a computer is sending data ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
3K+ Views
The Bootstrap Protocol (BOOTP) is a legacy computer networking protocol used to automatically assign IP addresses to devices on a network. BOOTP was developed in the 1980s as a way to assign IP addresses to diskless workstations without the need for a DHCP server. BOOTP works by allowing a device to broadcast a request for an IP address on the network. The BOOTP server, which is typically a router or a dedicated BOOTP server, receives the request and assigns an IP address to the device. The device then uses the assigned IP address to communicate with other devices on the ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
531 Views
The Birman-Schiper-Stephenson (BSS) Protocol is a distributed computing protocol that allows a group of computers to maintain a consistent shared state despite the possibility of failures. It was first described in a paper by Michael Birman, Roger Schiper, and Tom Stephenson in 1985. In the BSS Protocol, each computer in the group is assigned a unique identifier and acts as a "replica" of the shared state. The replicas communicate with each other using a series of message passing operations to maintain consistency of the shared state. The protocol is based on a "token" that is passed between replicas, which serves ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Binary Synchronous Communication (BISYNC) is a communication protocol that uses synchronous transmission to transfer data between devices. In BISYNC, data is transmitted in fixed-length blocks, called frames, with a start and stop bit at the beginning and end of each frame. The start and stop bits are used to synchronize the sender and receiver, so that they can accurately read and interpret the data in the frame. BISYNC uses a complex set of control characters to manage the flow of data and to maintain the synchronization between the sender and receiver. For example, the "ENQ" (enquiry) character is used to ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
4K+ Views
Berkeley's Algorithm is a distributed algorithm for computing the correct time in a network of computers. The algorithm is designed to work in a network where clocks may be running at slightly different rates, and some computers may experience intermittent communication failures. The basic idea behind Berkeley's Algorithm is that each computer in the network periodically sends its local time to a designated "master" computer, which then computes the correct time for the network based on the received timestamps. The master computer then sends the correct time back to all the computers in the network, and each computer sets its ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
2K+ Views
NS2 (Network Simulator version 2) is a discrete event network simulator that is widely used to simulate and analyze the behavior of computer networks. It is open-source software and is written in C++ and Otcl (Object-oriented Tool Command Language). The Otcl (Object-oriented Tool Command Language) is an extension of Tcl (Tool Command Language) and is used to create and control network entities and configure network scenarios in NS2. NS2 has two parts: the C++ part, which provides the underlying simulation engine, and the Otcl part, which provides the user interface and interaction between the user and the C++ part. The ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
306 Views
The SDLC, or Software Development Life Cycle, is a process used by organizations to plan, design, build, test, and deploy software. The SDLC provides a framework for managing the entire software development process, and it typically consists of several distinct phases. The basic frame structure of the SDLC is as follows − Planning − This phase involves defining the project scope, objectives, and requirements. It also includes identifying stakeholders, analyzing the business case, and creating a project plan. Analysis − In this phase, the requirements are gathered and the system is analyzed in order to create a detailed design ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
281 Views
The Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. The basic configuration of an ASA involves setting up basic networking, defining security policies, and configuring any desired VPN connections. Basic networking − Before configuring the ASA, you should make sure that the device has a valid IP address, subnet mask, and default gateway. You can configure these settings using the device's command-line interface (CLI). Security policies − The ASA uses access control lists (ACLs) to define security policies that control traffic flow. You can use the CLI ... Read More