Articles on Trending Technologies

Technical articles with clear explanations and examples

What is RPC Implementation?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

Remote Procedure Call (RPC) is a protocol that allows a program running on one computer to execute procedures or functions on another computer across a network. The calling program doesn't need to understand the underlying network details, making remote operations appear as local function calls. RPC abstracts the complexity of network communication, enabling distributed applications to interact seamlessly across different systems and networks. Applications of RPC RPC is widely used in various systems and applications: Active Directory service − Windows uses RPC for domain authentication and directory services. MMC terminals − Microsoft ...

Read More

Medium Access Control Sublayer (MAC sublayer)

Samual Sam
Samual Sam
Updated on 16-Mar-2026 106K+ Views

The Medium Access Control (MAC) sublayer is a critical component of the data link layer in the OSI reference model. It manages how devices access and share transmission media, controlling data flow and preventing collisions in shared network environments. The MAC sublayer acts as an intermediary between the upper layers and the physical transmission medium, ensuring orderly and efficient data transmission across networks like Ethernet, Wi-Fi, and other shared media technologies. MAC Layer in the OSI Model The data link layer (Layer 2) of the OSI model is divided into two distinct sublayers: Logical ...

Read More

Transmission opportunity (TXOP)

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

Transmit opportunity (TXOP) is a MAC layer feature used in IEEE 802.11-based wireless local area networks (WLANs). TXOP defines the time duration for which a station can send frames after it has gained contention for the transmission medium. By providing this contention-free time period, TXOP aims to increase the throughput of high priority data, such as voice and video. TXOP is available in Quality of Service (QoS) as part of Enhanced Distributed Channel Access (EDCA), which provides differentiated access to the wireless medium based on traffic categories. TXOP Time Allocation by Access Category ...

Read More

How to Reduce Risk of Exposure to CSRF, XSRF, or XSS Attacks?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 481 Views

We all rely extensively on the internet for our daily activities in today's digital world. Whether it's online shopping, social networking, or internet banking, we utilize numerous websites and applications to accomplish these tasks. While the internet has made our lives easier, it has also introduced new vulnerabilities such as Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and Cross-Site Resource Forgery (XSRF). These vulnerabilities can cause severe damage, ranging from data theft to website defacement, and can even compromise personal and organizational security. Understanding XSS, CSRF, and XSRF Attacks These web security vulnerabilities are among the most ...

Read More

What is the SNMP in the Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 9K+ Views

SNMP stands for Simple Network Management Protocol. It is an Internet-standard protocol for managing and monitoring devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, and network appliances. SNMP is primarily used in network management frameworks to monitor network-attached devices for conditions that require administrative attention. SNMP operates as an application-layer protocol that provides a framework for managing devices on the Internet using the TCP/IP protocol suite. It supports a set of fundamental operations for monitoring and maintaining network infrastructure across diverse hardware platforms. SNMP Network Management Architecture ...

Read More

What is a Domain Name System?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

The Domain Name System (DNS) is a hierarchical and decentralized naming system that translates human-readable domain names into machine-readable IP addresses. It serves as the internet's phonebook, enabling users to access websites using memorable names like www.example.com instead of complex numeric addresses like 192.168.1.1. DNS operates using the User Datagram Protocol (UDP) on port 53 and relies on a distributed network of DNS servers to resolve domain names efficiently across the global internet. How DNS Works When you type a domain name into your browser, DNS performs the following translation process: Step 1 − Your browser ...

Read More

What are the advantages and disadvantages of Antivirus?

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

Antivirus software is a program designed to detect, prevent, and remove malicious software from computer systems. It operates as a protective shield that identifies virus presence and eliminates threats while preventing future infections from compromising your system. Antivirus software represents one of the fundamental layers of cybersecurity protection for PCs, smartphones, and other connected devices. With modern devices handling everything from online banking to social media access, having reliable antivirus protection has become essential for any internet-connected technology. Antivirus Protection Workflow Threat Detection ...

Read More

Inter – frame spaces (RIFS, SIFS, PIFS, DIFS, AIFS, EIFS)

Moumita
Moumita
Updated on 16-Mar-2026 19K+ Views

Inter-frame spaces (IFS) are waiting periods between transmission of frames in the medium access control (MAC) sublayer where carrier-sense multiple access with collision avoidance (CSMA/CA) is used. These are techniques used to prevent collisions as defined in IEEE 802.11-based WLAN standard (Wi-Fi). IFS is the time period between completion of the transmission of the last frame and starting transmission of the next frame, apart from the variable back-off period. Different types of IFS provide priority mechanisms, with shorter durations indicating higher priority access to the wireless medium. Inter-frame Spaces Priority Order Higher ...

Read More

Elements of Network Protocol

Pranavnath
Pranavnath
Updated on 16-Mar-2026 3K+ Views

Computers perform operations based on commands received. The set of commands or rules is sent and processed by the network protocol. In networks, different types of computers are connected which may possess different hardware and software components. Therefore, it is necessary to enable computers of different types to communicate with each other using common rules established by network protocols. Network Protocol A network protocol provides a set of rules to be followed for data transmission in a secure and reliable way. Examples of network protocols include SMTP (Simple Mail Transfer Protocol) for email communication and FTP (File Transfer ...

Read More

How does communication happen between Manager & Agent?

Ginni
Ginni
Updated on 16-Mar-2026 360 Views

The manager sends a request to an agent, and the agent responds to the request, known as Request/Response interaction. The request is usually used to retrieve or modify management information associated with the network device. Types of Manager Requests Requests which are generated by the manager can be as follows: Get request-PDU − The manager generates a request for retrieving information on specific variables from the agent's MIB. Get Bulk request-PDU − The manager generates a request for bulk information retrieval, introduced in SNMP version 2. It allows the return of as much ...

Read More
Showing 11921–11930 of 61,297 articles
Advertisements