Articles on Trending Technologies

Technical articles with clear explanations and examples

Unicodes in computer network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 1K+ Views

Unicode is a universal character encoding standard that provides a consistent way to represent and handle text from all the world's writing systems. Developed by the Unicode Consortium in 1991, Unicode solves the limitations of ASCII by supporting millions of characters including letters, symbols, mathematical notations, and emojis from different languages and scripts. While ASCII can only represent 128-256 characters (sufficient only for English), Unicode can encode over 1.1 million characters, making it essential for modern global communications and computer networks. Unicode Character Encoding Coverage ASCII ...

Read More

Rake Receiver

Pranavnath
Pranavnath
Updated on 16-Mar-2026 7K+ Views

A Rake Receiver is a specialized receiver architecture used in CDMA (Code Division Multiple Access) systems to combat the effects of multipath fading. When radio signals encounter obstacles like buildings or terrain, they reflect and scatter, creating multiple copies of the signal that arrive at the receiver with different delays, amplitudes, and phases. The Rake receiver, developed by Price and Green, exploits this multipath phenomenon by capturing and combining these delayed signal copies to improve reception quality. How Rake Receiver Works The fundamental principle behind the Rake receiver is multipath diversity. Instead of treating multipath propagation as interference, ...

Read More

What is network services terminology?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 510 Views

The real function of every layer in the OSI model is to provide services to the layer above it. Understanding the terminology used in network services is essential for comprehending how different layers interact and communicate with each other. Key Network Service Entities Entities are active elements within each layer that can be either software-based (like processes) or hardware-based (like intelligent I/O chips). Peer entities are corresponding entities that exist in the same layer on different machines and communicate using the same protocol. Service Provider and Service User Relationship ...

Read More

What are security threats? Differentiate between wired and wireless threats

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 653 Views

Security threats are potential risks and vulnerabilities that can compromise the confidentiality, integrity, and availability of computer systems and networks. These threats can originate from various sources and target different aspects of digital infrastructure. Common Security Threats Hardware threats − Physical damage, theft, or unauthorized access to computing equipment that can lead to data breaches or system failures. Software threats − Malicious programs, viruses, and vulnerabilities in applications that can corrupt or steal critical organizational data. Hacking − Unauthorized access to systems through exploitation of security vulnerabilities, often involving malicious programs to ...

Read More

Need of IOT SSL Certificates and its Concerns

Satadru Jati
Satadru Jati
Updated on 16-Mar-2026 562 Views

An SSL (Secure Sockets Layer) certificate is a digital certificate that authenticates and verifies the identity of a website or server and enables secure communication between a client (such as a web browser) and the server. SSL certificates utilize encryption to ensure sensitive data is exchanged between the client and server, guaranteeing that it remains private and secure. Components of SSL Certificate Component Description Subject Entity (website or server) for which the certificate is issued Issuer Certificate Authority (CA) that signs and issues the certificate Public Key ...

Read More

What is Thin Ethernet?

Moumita
Moumita
Updated on 16-Mar-2026 2K+ Views

Thin Ethernet, popularly known as cheapernet or thinnet, is among the family of Ethernet standards that uses thinner coaxial cable as a transmission media. It is technically known as 10BASE-2. Here, 10 is the maximum throughput (10 Mbps), BASE denotes use of baseband transmission, and 2 refers to the maximum segment length of about 200 metres (precisely 185 metres). This type of cabling allows a maximum of 30 stations to be connected to it by BNC connectors with 50 centimetres minimum gap between subsequent stations. 10BASE-2 Thin Ethernet Network Topology ...

Read More

Understanding Tethering Network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 746 Views

Tethering is a network feature that enables a mobile device to share its internet connection with other devices such as laptops, tablets, or computers. This technology transforms your smartphone into a mobile router or modem, providing internet access in environments where traditional Wi-Fi or wired connections are unavailable. The primary advantage of tethering is its versatility − it allows users to establish internet connectivity anywhere with cellular coverage, making it an essential tool for remote work, travel, and emergency situations. Tethering Network Architecture ...

Read More

Difference between broadcast and Multicast

Pranavnath
Pranavnath
Updated on 16-Mar-2026 7K+ Views

Broadcast and Multicast are two fundamental communication methods in computer networks for transmitting data from one source to multiple destinations. Broadcasting sends data to all hosts within the same network, while multicasting delivers data to a specific group of interested hosts across networks. Understanding the differences between these methods is crucial for network administrators and developers to choose the most efficient communication strategy for their applications. Broadcast vs Multicast Communication Broadcast S ...

Read More

What are the general techniques to improve the quality of service?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 12K+ Views

Quality of Service (QoS) in networking refers to the ability of a network to provide reliable, predictable service to traffic across various technologies including Ethernet, wireless, IP, and ATM. QoS ensures that critical applications receive the bandwidth, latency, and reliability they require. Network congestion significantly impacts QoS and can result from insufficient bandwidth, high traffic on specific routes, or inefficient routing protocols. The routing algorithm's ability to detect traffic patterns and select optimal paths directly affects overall network performance and service quality. QoS Traffic Management Flow Incoming Traffic ...

Read More

Thick Ethernet vs thin Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 6K+ Views

Thick Ethernet and Thin Ethernet are two early forms of coaxial cable-based Ethernet networking that were widely used in the 1980s and early 1990s. Both technologies use CSMA/CD (Carrier Sense Multiple Access with Collision Detection) for media access control and operate in a bus topology. Thick Ethernet (10BASE5) Thick Ethernet was the first commercially available form of cabling supported by Ethernet. It is technically known as 10BASE5, where 10 represents the maximum throughput of 10 Mbps, BASE denotes the use of baseband transmission, and 5 refers to the maximum segment length of 500 meters (1, 600 ft). ...

Read More
Showing 11581–11590 of 61,303 articles
Advertisements