Articles on Trending Technologies

Technical articles with clear explanations and examples

Logical Link Control (LLC)

Moumita
Moumita
Updated on 16-Mar-2026 13K+ Views

The Logical Link Control (LLC) is the upper sublayer of the data link layer in the OSI reference model. It acts as an interface between the network layer and the medium access control (MAC) sublayer of the data link layer. The LLC sublayer is primarily used for its multiplexing capabilities, allowing multiple network protocols to operate simultaneously within a multipoint network over the same network medium. LLC Layer in the OSI Model The data link layer is divided into two sublayers to handle different aspects of data transmission: Logical Link Control (LLC) sublayer − ...

Read More

What are elementary data link layer protocols?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 33K+ Views

Elementary data link layer protocols are fundamental communication protocols that establish reliable data transmission between directly connected nodes. These protocols handle frame delivery, error detection, and flow control at the data link layer of the network stack. Elementary data link protocols are classified into three categories based on their complexity and capabilities: Protocol 1 − Unrestricted simplex protocol Protocol 2 − Simplex stop and wait protocol Protocol 3 − Simplex protocol for noisy channels Unrestricted Simplex Protocol The unrestricted simplex protocol represents the most basic form of data transmission. Data flows in one direction ...

Read More

Ethical Hacking Roadmap - 5 Phases to Success

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 974 Views

Security breaches have become a critical challenge for modern organizations. Price Waterhouse Coopers' "The Global State of Information Security Survey 2018" reveals that over 32% of 9, 500 interviewed executives believe their product quality is vulnerable to damage, while 39% are concerned about the loss or compromise of critical data. With cybersecurity affecting company reputation and business continuity, leaders like Tesla's Elon Musk prioritize security as more than just an IT issue. This has led to increased demand for ethical hackers who can proactively identify and fix vulnerabilities before malicious attackers exploit them. What is Ethical Hacking? ...

Read More

Tap and Go: Discovering the Wonders of Near Field Communication (NFC)

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 406 Views

In today's fast-paced world, Near Field Communication (NFC) has revolutionized the way we interact and connect with electronic devices. As a short-range wireless connectivity technology, NFC enables communication between two electronic devices over a distance of 4 cm or less, making tasks like contactless payments swift and secure. NFC operates at a frequency of 13.56 MHz and uses electromagnetic induction to establish communication. Unlike other wireless technologies, NFC can interact with both powered devices (like smartphones) and unpowered devices (like passive NFC tags embedded in posters or stickers). NFC Communication Range and Process ...

Read More

What is BISDN in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 10K+ Views

The B-ISDN (Broadband Integrated Services Digital Network) is a virtual circuit-switched network that can use high-speed packet switching services. B-ISDN uses a flexible multiplexing format called ATM (Asynchronous Transfer Mode) to deliver broadband services over digital networks. B-ISDN represents an evolution from the original ISDN, designed to handle high-bandwidth applications like video conferencing, multimedia communications, and high-speed data transfer that require significantly more capacity than traditional voice services. B-ISDN Service Classification Interactive Services Distribution Services ...

Read More

What is the character count? Explain with an example?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 13K+ Views

Data link layer translates the physical layer's raw bit stream into discrete messages called frames. The key challenge is determining how a frame can be transmitted so the receiver can recognize the start and end of each frame. Frame Delimitation Techniques The techniques used to identify frame boundaries are: Character count − Uses a header field to specify frame length Flag byte with byte stuffing − Uses special delimiter bytes Starting and ending flag with bit stuffing − Uses bit-level delimiters Encoding violation − Uses invalid signal patterns as delimiters Character Count Method ...

Read More

What is the difference between a Control Plane and a Data Plane?

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

In networking, routers and switches operate using distinct functional layers called planes. The two most important planes are the control plane and the data plane, each serving different but complementary roles in network operations. Control Plane The control plane is the "brain" of network devices that makes intelligent decisions about how data should flow through the network. It handles routing protocols, maintains routing tables, and establishes communication paths between network devices. Key functions of the control plane include: Routing protocol processing − Running protocols like OSPF, BGP, and RIP to exchange routing information ...

Read More

What are the types of Hubs in the Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 6K+ Views

A hub is a networking device used to connect multiple devices in a network, creating a single collision domain where all connected devices share the same bandwidth. Hubs operate at the Physical Layer (Layer 1) of the OSI model and simply repeat incoming signals to all connected ports. There are three main types of hubs based on their functionality and features: Passive Hub Passive hubs are the simplest networking devices that contain no electronic components or signal processing capabilities. They act as simple connection points that physically join network cable segments together without amplifying or regenerating signals. ...

Read More

What is physical layer coding violation?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 5K+ Views

The Physical Layer Coding Violation is a framing technique used in data communication to identify frame boundaries by intentionally violating the normal encoding rules of the physical layer. This method leverages the redundancy built into certain encoding schemes to create distinct markers for frame delimitation. How It Works This technique is specifically used in networks where the physical medium encoding contains redundancy, such as in Manchester encoding. In Manchester coding, each data bit is represented by two physical bits, creating natural redundancy that can be exploited for framing purposes. Manchester Encoding and Coding ...

Read More

Computer Network - Definition, Components, Objectives

Shubham Vora
Shubham Vora
Updated on 16-Mar-2026 3K+ Views

A computer network is a collection of interconnected computing devices that can exchange data and share resources with each other. These networked devices use standardized rules called communication protocols to transmit information over physical or wireless connections. Computer networks enable distributed processing where tasks are divided among multiple computers rather than being handled by a single machine. This collaborative approach allows organizations to achieve greater efficiency, resource sharing, and scalability across different locations. Basic Computer Network Structure Client Client ...

Read More
Showing 12561–12570 of 61,297 articles
Advertisements