Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Satish Kumar
Page 4 of 94
Evolution of Distributed Computing Systems
Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud computing, distributed computing systems have come a long way. In this article, we will discuss evolution of distributed computing systems and explore some of examples. Early Days of Distributed Computing The early days of distributed computing can be traced back to 1960s, where researchers began experimenting with idea of sharing ...
Read MoreEvent Ordering in Distributed System
Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events in system. This article will discuss event ordering in distributed systems and provide examples of different techniques used to achieve it. Event Ordering Event ordering is essential in distributed systems because it determines order in which events occur. In a distributed system, events can happen concurrently on different nodes, and ...
Read MoreEthernet Transmitter Algorithm
Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data is transmitted over Ethernet network. In this article, we will discuss Ethernet transmitter algorithm, its subheadings, and examples. Overview of Ethernet Transmitter Algorithm The Ethernet transmitter algorithm is a set of rules that governs transmission of data packets over an Ethernet network. algorithm ensures that data packets are transmitted in ...
Read MoreEthernet Frame Format
Ethernet is a widely used local area networking technology that enables devices to communicate with each other. Ethernet frames are basic units of data that are transmitted over Ethernet network. In this article, we will explore Ethernet frame format in detail, including various fields that make up frame and purpose of each field. Introduction to Ethernet Frames An Ethernet frame is a packet of data that is transmitted over an Ethernet network. frame is composed of a header, a payload, and a trailer. header and trailer contain information about frame, such as source and destination addresses, while payload contains actual ...
Read MoreEtherChannel in Computer Network
Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique used in computer networks to combine multiple physical links into a logical link. goal is to increase available bandwidth and provide redundancy, fault tolerance, and load balancing. In an EtherChannel, multiple physical links are bundled together, appearing as a single logical link to network devices connected to it. Benefits of ...
Read MoreActive and Passive attacks in Information Security
Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used by hackers, and ways to protect against these types of threats. What is an Active Attack? An active attack occurs when a hacker attempts to alter or manipulate data in a system. This type of attack can be easily identified as it typically involves an attacker trying to perform some ...
Read MoreAccess Lists (ACL)
In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ...
Read MoreAccess and trunk ports
Introduction In computer networking, a network switch is a device that connects network devices together to enable communication within a network. Switches are an essential component of any modern network, and they provide a way to manage network traffic by directing data to appropriate device. Access and trunk ports are two types of ports used on switches to manage network traffic. In this article, we will discuss access and trunk ports, their differences, and when to use them. What are Access and Trunk Ports? Access ports and trunk ports are two types of ports used on network switches. Access ...
Read MoreA Model for Network Security
Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can be used by organizations to protect their networks. Understanding Threat Landscape Before implementing a network security model, it is important to understand threat landscape. Cyber attackers can use a variety of techniques to compromise a network, including − Malware Malware is malicious software that is designed to damage, disrupt ...
Read MoreA Cryptographic Introduction to Hashing and Hash Collisions
Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. This article will provide a cryptographic introduction to hashing and hash collisions, explaining how hash functions work and why hash collisions can be a problem. What is Hashing? Hashing is a process that takes input data of any size and maps it to a fixed-size output, which is called a ...
Read More