Articles on Trending Technologies

Technical articles with clear explanations and examples

What is virtual circuit packet switching?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 19K+ Views

Virtual circuit packet switching is a connection-oriented packet switching technique where a logical path is established between the source and destination before data transmission begins. Unlike datagram switching, all packets in a virtual circuit follow the same predetermined route through the network. In virtual circuit switching, the network establishes a virtual connection that appears as a dedicated physical circuit between communicating devices. This logical path reserves resources and ensures packets arrive in the correct order at the destination. How Virtual Circuit Switching Works Virtual circuit packet switching operates through three distinct phases: Call Setup ...

Read More

Differentiate between piconet and scatternet

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 17K+ Views

Let us understand the concept of piconet and scatternet before learning the differences between them. Piconet A piconet is a network created by connecting multiple wireless devices using Bluetooth technology. In a piconet network, one master device exists that can connect to up to 7 slave devices, forming a network of maximum 8 devices total. The master device controls communication and coordinates access to the shared radio channel. Due to the limited number of active devices, channel bandwidth utilization is conservative but sufficient for short-range applications. Piconet Structure ...

Read More

How to Keep Your Browser Safe on Work and Home Networks (with an Optional Chrome VPN Layer)

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

A single thoughtless click on a browser tab can cause hours of frantic IT calls, network scans, and security resets in numerous workplaces. When you seek a recipe or a good offer online, you may encounter pop-ups or phishing attempts that compromise security. These incidents happen frequently in our interconnected world. The browser serves as the front entrance to the Internet, whether you're in a busy office or at home. Like any front door, it can be secured and reinforced, or left open for threats to enter. This article discusses practical, step-by-step methods to strengthen your browser security across ...

Read More

Clear To Send (RTS)

Ankith Reddy
Ankith Reddy
Updated on 16-Mar-2026 4K+ Views

Clear to Send (CTS) is a control frame employed in the medium access control (MAC) layer protocol IEEE 802.11 RTS/CTS. The protocol uses the concept of Multiple Access with Collision Avoidance (MACA) in wireless networks. The RTS/CTS (Request to Send / Clear to Send) mechanism aims to reduce frame collisions introduced by the hidden terminal problem. CTS frame is sent by the receiver after it gets the RTS frame prior to receiving of the actual data frame. Working Principle of MACA implementing CTS The MACA protocol works with the condition that the communicating stations are synchronized and frame ...

Read More

Point Coordination Function (PCF)

Moumita
Moumita
Updated on 16-Mar-2026 7K+ Views

Point Coordination Function (PCF) is an optional medium access control (MAC) technique used in IEEE 802.11-based WLAN standards including Wi-Fi. It works alongside the mandatory Distributed Coordination Function (DCF) to provide collision-free access to the wireless medium through centralized polling. PCF operates at the access point (AP) level, where a Point Coordinator (PC) manages channel access by polling stations in a round-robin fashion. This eliminates the contention-based access used in CSMA/CA, providing more predictable and efficient medium utilization. Key Features of PCF Centralized control − The Point Coordinator in the AP manages all medium access ...

Read More

Static Web Pages

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

A static web page is an HTML document that displays the same content to every visitor, regardless of when or how they access it. Unlike dynamic pages, static pages contain fixed content that doesn't change based on user interactions, database queries, or server-side processing. Static web pages are created using HTML, CSS, and sometimes JavaScript for basic client-side functionality. They are stored as files on a web server and delivered directly to users' browsers without any server-side processing or database interaction. Static Web Page Architecture ...

Read More

Understanding Web Authentication behind the login screen

Pranavnath
Pranavnath
Updated on 16-Mar-2026 806 Views

Web Authentication is the process of verifying user credentials when accessing online accounts like e-commerce websites, social media platforms, or online banking services. Each user account is assigned a unique identifier and password, which are securely stored on web servers for future verification. Modern authentication also supports biometric methods like fingerprint scanning, facial recognition, and voice authentication. Consider Gmail as an example − during login, users must enter their username/email and password. Only when this combination matches the mail server database records will access be granted to the account and its services. Web Authentication ...

Read More

Basic Frame Structure of HDLC

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

HDLC stands for High-level Data Link Control which is a collection of protocols that ensures communication purposes among nodes or network points. It was developed by the International Organization for Standardization (ISO). The data to be transmitted is organized in the form of frames which when transferred to the destination is acknowledged for its appropriate arrival. It can be applied to both point-to-point connections and multipoint connections as it is a bit-oriented protocol. The system of Automatic Repeat Request is implemented via HDLC and also full-duplex communications could be done with the help of HDLC. Due to its high ...

Read More

What is NAS in the Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

NAS stands for Network Attached Storage. It is a dedicated storage device connected to a network that provides file access services to multiple computer systems. NAS devices consist of storage drives and a specialized engine that implements file services, using protocols like NFS (Network File System) or CIFS (Common Internet File System). NAS systems are popular with enterprises and small organizations across many industries as effective, scalable, and cost-efficient storage solutions. They support applications like email systems, accounting databases, payroll processing, video recording and editing, and data logging operations. Network Attached Storage (NAS) Architecture ...

Read More

What are the different access technologies in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 5K+ Views

Access networks are the infrastructure that connects end users (homes, businesses, mobile devices) to their Internet Service Provider (ISP) or the broader internet. They represent the "last mile" connection between users and the core network infrastructure. Access networks serve as the bridge between end systems and the internet backbone, enabling users to send and receive data across global networks. The choice of access technology depends on factors like available infrastructure, required bandwidth, cost, and geographical location. Types of Access Technologies Modern access networks employ various technologies to provide connectivity: Digital Subscriber Line (DSL) − Uses ...

Read More
Showing 11531–11540 of 61,303 articles
Advertisements