Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
Difference between Phishing and Vishing
Phishing and Vishing are two common forms of social engineering attacks used by cybercriminals to steal sensitive information from unsuspecting victims. While both aim to deceive users into revealing personal data, they employ different communication methods and tactics. Understanding the differences between these attack vectors is crucial for maintaining cybersecurity awareness and protecting yourself from fraud attempts. What is Phishing? Phishing is a cyber attack that uses electronic communication, primarily emails, to deceive users into revealing sensitive information. Attackers create fraudulent emails that appear to come from legitimate organizations, such as banks, social media platforms, or online ...
Read MoreOverview of Desk Area Network (DAN)
A Desk Area Network (DAN) is a specialized network architecture designed for multimedia workstations that enables direct connection of multimedia devices and peripherals to the network. DAN uses Asynchronous Transfer Mode (ATM) technology to provide high-speed, reliable communication between multimedia devices, workstations, and peripheral equipment without requiring data to pass through the central workstation. Before DAN, multimedia devices like cameras, audio equipment, and displays had to communicate through the workstation, creating bottlenecks and reducing performance. DAN eliminates this limitation by allowing devices to connect directly to the network infrastructure. Architecture of DAN The DAN architecture consists of ...
Read MoreWhat are the advantages and disadvantages of Fibre optic Cable?
Optical fibre is a hair-thin glass or plastic fibre with a typical diameter of 125 micrometers (μm), which forms the cladding or outer reflecting layer. The core or inner transmitting path is generally as small as 10μm. This medium enables the transmission of data as light pulses rather than electrical signals. The process relies on total internal reflection, where light rays transmitted into the fibre travel and reflect within the core over long distances with minimal attenuation while maintaining signal intensity. Fibre Optic Cable Structure ...
Read MoreNetwork Control Protocol (NCP)
Network Control Protocol (NCP) is a set of protocols forming a part of Point-to-Point Protocol (PPP). PPP is a data link layer protocol that is used to transmit multiprotocol data between two directly connected (point-to-point) computers. PPP is composed of Link Control Protocol (LCP), Authentication Protocol (AP), and Network Control Protocol (NCP). NCPs are used for negotiating the parameters and facilities for the network layer. For every higher-layer protocol supported by PPP, one corresponding NCP is implemented to handle its specific configuration requirements. How NCP Works NCPs operate at the network layer within the PPP framework. They ...
Read MoreToken Passing in Bit-Map Protocol
Bit-map protocol is a collision free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. Every station gets its turn for transmission in a predefined order. A method to accomplish this is to use the method of token passing. Token Passing Mechanism A token is a small message that circulates among the stations of a computer network providing permission ...
Read MoreInternet Corporation for Assigned Names and Numbers (ICANN)
The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization that coordinates the Internet's unique identifier systems, ensuring global connectivity and stability. Established in 1998, ICANN manages critical Internet resources including domain names, IP addresses, and protocol parameters that enable seamless worldwide communication. ICANN operates under a multi-stakeholder governance model, bringing together governments, private sector, technical community, and civil society to make consensus-based decisions about Internet infrastructure management. Core Functions of ICANN ICANN performs three primary functions essential to Internet operations: Domain Name System (DNS) Management − Oversees the global DNS ...
Read MorePort Address Translation or PAT mapping to Private IPs
Port Address Translation (PAT) is a dynamic form of Network Address Translation (NAT) that enables multiple devices with private IP addresses to share a single public IP address by using unique port numbers. This technique conserves valuable IP addresses while providing enhanced security and cost efficiency for organizations. PAT solves the critical challenge of IPv4 address exhaustion by allowing many-to-one mappings, making it an essential technology for modern network infrastructure. How PAT Works When an internal device initiates an outbound connection, the PAT-enabled router performs two key functions: it replaces the private source IP address with the ...
Read MoreWhat are the Advantages and Disadvantages of LAN in Computer Network?
A Local Area Network (LAN) is a computer network that connects devices within a limited geographical area such as a building, office, or campus. Understanding the advantages and disadvantages of LAN helps organizations make informed decisions about network implementation. LAN Network Components Computer 1 Computer 2 Printer Server Switch Advantages of LAN ...
Read MoreWhat is Vishing (Voice Phishing)?
Vishing (voice phishing) is a type of social engineering attack that uses telephony, typically Voice over IP (VoIP) technology, to deceive victims into revealing sensitive personal or financial information over the phone. Unlike traditional landline services that are tied to physical locations and bill-payers, modern VoIP technologies enable attackers to use caller ID spoofing and automated systems to evade detection. Criminals exploit these technologies to steal credit card numbers, banking credentials, and personal information for identity theft purposes. How Vishing Works Attacker ...
Read MoreWhat is Payload in Computer Network?
In computer networking and telecommunications, when a transmission unit is sent from the source to the destination, it contains both a header and the actual data to be transmitted. This actual data is called the payload. The header contains the protocol information as well as the source and destination addresses, which are required for delivery of the payload. The payload is the essential information required by the destination client. Data Link Layer Frame Structure Header Control Info Payload (Actual Data) Data ...
Read More