sudhir sharma

sudhir sharma

975 Articles Published

Articles by sudhir sharma

Page 17 of 98

A Comprehensive Guide To Understanding Image Steganography Techniques And Types

sudhir sharma
sudhir sharma
Updated on 12-Apr-2023 3K+ Views

Introduction In today's digital world, privacy and data protection have become increasingly important. With sensitive information being transmitted online every day, ensuring that it stays out of the wrong hands is crucial. Image steganography offers an advanced method for keeping your secrets safe by discreetly hiding them within ordinary images or photographs. This comprehensive guide will provide you with valuable insights into various techniques and types of image steganography to help secure your precious data from prying eyes. For anyone interested in cybersecurity, cryptography, and covert communication methods, this article is a must-read! So let's dive in and unveil the ...

Read More

Image Encryption Using Cellular Automata

sudhir sharma
sudhir sharma
Updated on 12-Apr-2023 648 Views

Encrypting an image protects communication by rendering it indecipherable for those who do not get the decryption key. One method of encrypting images is using cellular automata, which are mathematical models that use a grid of cells to simulate complex systems. In this article, we'll look at how cellular automata may be employed for encrypted images and why it's so popular. Cellular Automata Analysis To comprehend how cellular automata are applicable to image encryption, you must first understand what they are and how they work. Understanding Cellular Automata In order to understand how cellular automata can be used for ...

Read More

IGRP Routing Protocol

sudhir sharma
sudhir sharma
Updated on 12-Apr-2023 3K+ Views

Introduction with Historical Background The Interior Gateway Routing Protocol (IGRP) was developed by Cisco Systems in mid 1980s. It is a distance-vector routing protocol and uses the metric called composite metric to calculate the best route between two communication networks. The main purpose of IGRP is to exchange information about networks available within an autonomous system. It supports up to 255 hops, has unlimited hop count, and can perform load balancing over several paths simultaneously. IGRP also allows for easy scalability from large networks down to small ones or vice versa; this makes it suitable for use in many different ...

Read More

IEEE 802.6 (DQDB)

sudhir sharma
sudhir sharma
Updated on 12-Apr-2023 6K+ Views

Background of IEEE 802.6 (DQDB) IEEE 802.6, or Distributed Queue Dual Bus (DQDB), is a metropolitan area network (MAN) technology for LANs developed by the Institute for Electrical and Electronic Engineers' Committee for Computer Communications Standards. It is designed for use in metropolitan areas with wide geographical coverage, such as cities, campuses, and other places where the users are linked together over distances up to 10 kilometers apart. The fundamental idea behind DQDB is to build numerous virtual buses that can be utilised for two endpoints on a network to communicate in both directions. Each bus has its own unique ...

Read More

The PACELC theorem

sudhir sharma
sudhir sharma
Updated on 27-Feb-2023 564 Views

The PACELC theorem is a fundamental concept in distributed systems that deals with the trade-offs between consistency, availability, latency, partition tolerance, durability, and efficiency. This theorem was introduced in the early 2000s and has since become a cornerstone of modern distributed system design. In this article, we will discuss the PACELC theorem in depth, exploring each of its components and how they are related to one another. We will also talk about how the theorem affects the design and implementation of distributed systems. Consistency A distributed system's consistency guarantees that all nodes in the system have the same view of ...

Read More

Universal Asynchronous Receiver Transmitter (UART) Protocol

sudhir sharma
sudhir sharma
Updated on 27-Feb-2023 2K+ Views

Introduction The Universal Asynchronous Receiver Transmitter (UART) protocol is a widely used communication standard in electronics and microcontroller systems. This article provides a comprehensive overview of the UART protocol, including its basic principles, data transmission mechanisms, configuration options, and common applications. What is UART? UART is a protocol that enables serial communication between two electronic devices. Microcontrollers and other embedded systems for data transmission and control use this protocol extensively. The protocol operates on a simple and efficient mechanism, where data is sent in a series of bits through a single transmission line. UART Basic Principles UART communication follows a ...

Read More

IBOC Technology

sudhir sharma
sudhir sharma
Updated on 27-Feb-2023 955 Views

IBOC technology, or In-Band On-Channel technology, is a digital broadcasting technology that allows radio stations to transmit both analog and digital signals simultaneously. Many people see this technology as the future of radio broadcasting, as it provides numerous advantages over conventional analog radio. One of the key advantages of IBOC technology is its ability to offer high-quality audio. Digital signals are less susceptible to interference and signal degradation than analog signals, which means that IBOC broadcasts can offer crystal-clear sound with none of the static or hiss that is often associated with analog radio. In addition, IBOC technology can transmit ...

Read More

Bearer Types Used for WAP in GSM

sudhir sharma
sudhir sharma
Updated on 27-Feb-2023 1K+ Views

You may be interested in learning more about Wireless Application Protocol (WAP) in Global System for Mobile Communications (GSM). One of the crucial elements in understanding WAP in GSM is knowing the bearer types used in this context. A bearer type is a means of carrying data between two points. In the case of WAP in GSM, there are two bearer types used, circuit-switched (CS) and packet-switched (PS). CS bearer types are established when a phone call is initiated, and data is transferred through the same channel as the voice call. This method is relatively slower, but it is more ...

Read More

Schiper Eggli Sandoz Protocol

sudhir sharma
sudhir sharma
Updated on 27-Feb-2023 969 Views

The Schiper Eggli Sandoz (SES) protocol, a storied and valiant champion of networking, has a mission to find the best path for data packets to traverse through the network. With a heart of a poet, it distributes the routing information to all routers in the network, rather than entrusting the task to a single central routing table. Such a noble and democratic approach results in more dynamic and efficient routing, as well as rapid recovery from network failures. The SES protocol, armed with the power of the Bellman-Ford algorithm and the cunning of split horizon, determines the shortest path for ...

Read More

Poison Reverse vs Split Horizon

sudhir sharma
sudhir sharma
Updated on 27-Feb-2023 3K+ Views

Routing protocols are used to determine the best path for data to travel through a network. They are responsible for maintaining and updating routing tables, which are used by routers to determine the best path for data to travel through a network. There are several different types of routing protocols, each with their own unique characteristics and uses. One of the most commonly used routing protocols is Poison Reverse. Poison Reverse is a technique used to prevent routing loops by marking a route as invalid if it is learned from a neighbor that is not the next hop. This technique ...

Read More
Showing 161–170 of 975 articles
« Prev 1 15 16 17 18 19 98 Next »
Advertisements