Articles on Trending Technologies

Technical articles with clear explanations and examples

Everything about Ransomware – Definition, Types, and Prevention

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 321 Views

Ransomware is a type of malicious software that encrypts a victim's files and demands payment (usually in cryptocurrency) for the decryption key. When ransomware attacks a computer, it blocks access to critical data and systems until the ransom is paid. Attackers often threaten to permanently delete files or leak sensitive information publicly if their demands are not met. This form of cyberattack has evolved into one of the most significant security threats facing organizations and individuals worldwide, with attacks becoming increasingly sophisticated and costly. How Ransomware Works Ransomware attacks follow a predictable pattern that unfolds in several ...

Read More

What are transmission and propagation delay?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

Network delay is defined as how much time it takes for data to travel from one node to another node in a network. Understanding network delay is crucial for optimizing network performance and predicting data transfer times. Network delay can be divided into the following components: Transmission delay − Time to push all packet bits onto the transmission medium Propagation delay − Time for bits to travel through the physical medium to reach the destination Transmission vs Propagation Delay Sender ...

Read More

3-Layer of IOT architecture?

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

The Internet of Things (IoT) represents a network of physical objects or "things" that are embedded with sensors, software, electronics, and network connectivity. These components enable objects to collect and exchange data over the internet. The objective of IoT is to extend web connectivity from standard devices like computers and smartphones to everyday objects such as home appliances, vehicles, and industrial equipment. Components of IoT The IoT ecosystem consists of four fundamental components that work together to enable seamless data collection, processing, and user interaction: Sensors/Devices Sensors and devices are the foundation of any IoT system, ...

Read More

Low-Density Parity Check (LDPC)

Rishi Rathor
Rishi Rathor
Updated on 16-Mar-2026 13K+ Views

Low-Density Parity Check (LDPC) codes are linear error-correcting block codes designed for correcting errors in large block sizes transmitted through very noisy channels. These codes provide excellent error correction performance while maintaining relatively low computational complexity. LDPC codes were developed by Robert G. Gallager in his doctoral dissertation at the Massachusetts Institute of Technology in 1960. Due to their inventor, these codes are also known as Gallager codes. Structure of LDPC Codes An LDPC code is specified by a parity-check matrix that contains mostly 0s and a low density of 1s. The rows of this matrix represent ...

Read More

What is three-bit sliding window protocol?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

Sliding window protocol is a transmission control protocol used for reliable data communication. Both sender and receiver maintain finite buffers to hold outgoing and incoming packets, with every packet requiring acknowledgment from the receiver. The sender maintains a timer for every packet sent, and any unacknowledged packet within a certain time is retransmitted. The sender can transmit a complete window of packets before receiving acknowledgment for the first packet, leading to higher transfer rates as multiple packets are sent without waiting for individual acknowledgments. The receiver advertises a window size that tells the sender how much data it ...

Read More

How does the MANETS AODV Reactive Routing Protocol work?

Ginni
Ginni
Updated on 16-Mar-2026 3K+ Views

MANET stands for Mobile Ad-Hoc Network. It is an infrastructure-less collection of mobile nodes that can arbitrarily change their geographic locations, creating networks with dynamic topologies composed of bandwidth-constrained wireless links. MANET nodes are equipped with wireless transmitters and receivers. Based on node positions, coverage designs, and transmission power levels, wireless connectivity exists between nodes in the form of a random, multi-hop graph. Current applications include defense services, emergency search and rescue, meetings, conventions, and scenarios requiring quick information sharing without fixed infrastructure. Unpredictable topological changes make route discovery and maintenance challenging in these networks. Conventional routing protocols ...

Read More

Bootstrap Protocol (BOOTP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

The Bootstrap Protocol (BOOTP) is a legacy computer networking protocol used to automatically assign IP addresses to devices on a network. BOOTP was developed in the 1980s as a way to assign IP addresses to diskless workstations without the need for manual configuration. BOOTP operates by allowing a device to broadcast a request for an IP address on the network. The BOOTP server, which is typically a router or a dedicated server, receives the request and assigns a static IP address to the device based on its MAC address. The device then uses the assigned IP address to communicate ...

Read More

Cracking the Code: Understanding the LLC Protocol Data Unit

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 961 Views

The Logical Link Control (LLC) Protocol Data Unit (PDU) is a critical component in the IEEE 802 reference model that operates at the upper portion of the data link layer. It manages flow control, error detection, and synchronization between network devices, ensuring reliable data transmission across different network technologies. LLC serves as an interface between network layer protocols (such as IP) and the Media Access Control (MAC) sublayer, providing a standardized way to handle data communication regardless of the underlying physical network technology. Purpose and Definition of LLC PDU The LLC PDU encapsulates data received from upper-layer ...

Read More

What are the services provided by the Network Layer?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 15K+ Views

The Network Layer is the third layer in the OSI model of computer networking. It handles packet forwarding, routing through routers, and quality of service management. This layer acts as an intermediary between the transport layer and the data link layer, providing essential services for end-to-end communication across networks. Nature of the Service The transport layer at the host receives services from the network layer, but there's an important distinction: the transport layer resides in end hosts, while the network layer operates within the subnet. The subnet is a collection of routers containing only the bottom three OSI ...

Read More

What is the MITM (Man in The Middle) Attack using ARP Poisoning?

Ginni
Ginni
Updated on 16-Mar-2026 648 Views

A Man-in-the-Middle (MITM) attack is a cyber attack where an attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other. This allows the attacker to eavesdrop on conversations, steal sensitive information, or manipulate the data being exchanged. In MITM attacks, the attacker positions themselves between the victim and their intended communication target, creating a scenario where all traffic flows through the attacker's system. This enables them to capture passwords, session tokens, personal data, and other sensitive information without the victims' knowledge. ARP Poisoning Attack ARP (Address Resolution Protocol) ...

Read More
Showing 12631–12640 of 61,297 articles
Advertisements