Articles on Trending Technologies

Technical articles with clear explanations and examples

Difference between Phishing and Vishing

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 898 Views

Phishing and Vishing are two common forms of social engineering attacks used by cybercriminals to steal sensitive information from unsuspecting victims. While both aim to deceive users into revealing personal data, they employ different communication methods and tactics. Understanding the differences between these attack vectors is crucial for maintaining cybersecurity awareness and protecting yourself from fraud attempts. What is Phishing? Phishing is a cyber attack that uses electronic communication, primarily emails, to deceive users into revealing sensitive information. Attackers create fraudulent emails that appear to come from legitimate organizations, such as banks, social media platforms, or online ...

Read More

Overview of Desk Area Network (DAN)

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 754 Views

A Desk Area Network (DAN) is a specialized network architecture designed for multimedia workstations that enables direct connection of multimedia devices and peripherals to the network. DAN uses Asynchronous Transfer Mode (ATM) technology to provide high-speed, reliable communication between multimedia devices, workstations, and peripheral equipment without requiring data to pass through the central workstation. Before DAN, multimedia devices like cameras, audio equipment, and displays had to communicate through the workstation, creating bottlenecks and reducing performance. DAN eliminates this limitation by allowing devices to connect directly to the network infrastructure. Architecture of DAN The DAN architecture consists of ...

Read More

What are the advantages and disadvantages of Fibre optic Cable?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

Optical fibre is a hair-thin glass or plastic fibre with a typical diameter of 125 micrometers (μm), which forms the cladding or outer reflecting layer. The core or inner transmitting path is generally as small as 10μm. This medium enables the transmission of data as light pulses rather than electrical signals. The process relies on total internal reflection, where light rays transmitted into the fibre travel and reflect within the core over long distances with minimal attenuation while maintaining signal intensity. Fibre Optic Cable Structure ...

Read More

Network Control Protocol (NCP)

Krantik Chavan
Krantik Chavan
Updated on 16-Mar-2026 4K+ Views

Network Control Protocol (NCP) is a set of protocols forming a part of Point-to-Point Protocol (PPP). PPP is a data link layer protocol that is used to transmit multiprotocol data between two directly connected (point-to-point) computers. PPP is composed of Link Control Protocol (LCP), Authentication Protocol (AP), and Network Control Protocol (NCP). NCPs are used for negotiating the parameters and facilities for the network layer. For every higher-layer protocol supported by PPP, one corresponding NCP is implemented to handle its specific configuration requirements. How NCP Works NCPs operate at the network layer within the PPP framework. They ...

Read More

Token Passing in Bit-Map Protocol

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 2K+ Views

Bit-map protocol is a collision free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. Every station gets its turn for transmission in a predefined order. A method to accomplish this is to use the method of token passing. Token Passing Mechanism A token is a small message that circulates among the stations of a computer network providing permission ...

Read More

Internet Corporation for Assigned Names and Numbers (ICANN)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 575 Views

The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization that coordinates the Internet's unique identifier systems, ensuring global connectivity and stability. Established in 1998, ICANN manages critical Internet resources including domain names, IP addresses, and protocol parameters that enable seamless worldwide communication. ICANN operates under a multi-stakeholder governance model, bringing together governments, private sector, technical community, and civil society to make consensus-based decisions about Internet infrastructure management. Core Functions of ICANN ICANN performs three primary functions essential to Internet operations: Domain Name System (DNS) Management − Oversees the global DNS ...

Read More

Port Address Translation or PAT mapping to Private IPs

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 686 Views

Port Address Translation (PAT) is a dynamic form of Network Address Translation (NAT) that enables multiple devices with private IP addresses to share a single public IP address by using unique port numbers. This technique conserves valuable IP addresses while providing enhanced security and cost efficiency for organizations. PAT solves the critical challenge of IPv4 address exhaustion by allowing many-to-one mappings, making it an essential technology for modern network infrastructure. How PAT Works When an internal device initiates an outbound connection, the PAT-enabled router performs two key functions: it replaces the private source IP address with the ...

Read More

What are the Advantages and Disadvantages of LAN in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 11K+ Views

A Local Area Network (LAN) is a computer network that connects devices within a limited geographical area such as a building, office, or campus. Understanding the advantages and disadvantages of LAN helps organizations make informed decisions about network implementation. LAN Network Components Computer 1 Computer 2 Printer Server Switch Advantages of LAN ...

Read More

What is Vishing (Voice Phishing)?

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 358 Views

Vishing (voice phishing) is a type of social engineering attack that uses telephony, typically Voice over IP (VoIP) technology, to deceive victims into revealing sensitive personal or financial information over the phone. Unlike traditional landline services that are tied to physical locations and bill-payers, modern VoIP technologies enable attackers to use caller ID spoofing and automated systems to evade detection. Criminals exploit these technologies to steal credit card numbers, banking credentials, and personal information for identity theft purposes. How Vishing Works Attacker ...

Read More

What is Payload in Computer Network?

Krantik Chavan
Krantik Chavan
Updated on 16-Mar-2026 6K+ Views

In computer networking and telecommunications, when a transmission unit is sent from the source to the destination, it contains both a header and the actual data to be transmitted. This actual data is called the payload. The header contains the protocol information as well as the source and destination addresses, which are required for delivery of the payload. The payload is the essential information required by the destination client. Data Link Layer Frame Structure Header Control Info Payload (Actual Data) Data ...

Read More
Showing 12201–12210 of 61,297 articles
Advertisements