Articles on Trending Technologies

Technical articles with clear explanations and examples

CSMA with Collision Detection (CSMA/CD

Rama Giri
Rama Giri
Updated on 16-Mar-2026 79K+ Views

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and defers transmissions until the channel is free. The collision detection technology detects collisions by sensing transmissions from other stations. On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random time interval before retransmission. How CSMA/CD Works CSMA/CD Operation Process ...

Read More

Difference between Private and Public IP addresses

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 27K+ Views

An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address serves two primary functions: identifying a host or network interface, and providing location addressing to establish communication paths. IP addresses can be either Public or Private, each serving different networking purposes. Understanding this distinction is crucial for network configuration and security. Public vs Private IP Address Architecture Internet ...

Read More

All about I love you Virus

Pranavnath
Pranavnath
Updated on 16-Mar-2026 334 Views

The I Love You virus, also known as the "ILOVEYOU" worm, was one of the most destructive computer viruses in history. Released in May 2000, this virus spread rapidly through email systems worldwide, causing billions of dollars in damage and infecting millions of computers within just a few days. This virus demonstrated the vulnerability of email systems and highlighted the importance of cybersecurity awareness. It was created by Onel de Guzman, a 24-year-old computer science student from the Philippines, and became a landmark case in cybersecurity history. How the I Love You Virus Works The virus spreads ...

Read More

CSMA with Collision Avoidance (CSMA/CA)

Paul Richard
Paul Richard
Updated on 16-Mar-2026 53K+ Views

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. In contrast to CSMA/CD (Carrier Sense Multiple Access/Collision Detection) that deals with collisions after their occurrence, CSMA/CA prevents collisions prior to their occurrence. CSMA/CA is primarily used in wireless networks where collision detection is difficult or impossible due to the hidden terminal problem and the inability to simultaneously transmit and receive on the same channel. How CSMA/CA Works The algorithm of CSMA/CA follows these steps: When a frame is ready, ...

Read More

Gigabit Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 7K+ Views

In computer networks, Gigabit Ethernet (GbE) is the family of Ethernet technologies that achieve theoretical data rates of 1 gigabit per second (1 Gbps). It was introduced in 1999 and represents a significant upgrade from Fast Ethernet's 100 Mbps, providing 10 times faster data transmission speeds. Gigabit Ethernet maintains backward compatibility with existing Ethernet standards while delivering the high-speed connectivity required for modern networks, data centers, and bandwidth-intensive applications. Varieties of Gigabit Ethernet The popular varieties of Gigabit Ethernet are 1000Base-SX, 1000Base-LX, 1000BASE-T, and 1000Base-CX. Each variant uses different physical media and is optimized for specific distance ...

Read More

How to build a wireless home network without a router

Lakshmi Srinivas
Lakshmi Srinivas
Updated on 16-Mar-2026 2K+ Views

Setting up a wireless internet connection without a router is usually done using an ad-hoc network. This is a peer-to-peer network configuration where devices connect directly to each other without requiring a central access point. Small businesses and home users often establish ad-hoc computer-to-computer networks when they don't have access to a traditional router. What is an Ad-hoc Network An ad-hoc network allows devices with wireless capabilities to connect directly to each other, creating a temporary network without infrastructure. If you have Windows Vista, Windows 7, Windows XP, or newer systems, you can build your own wireless network ...

Read More

Difference between Encryption and Decryption

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 11K+ Views

The process of turning plain text into an encrypted form (cipher text) is known as encryption. Sensitive data is transmitted in an encrypted form so that it can be protected, and a strong encryption mechanism ensures that the data is not misused even if a hacker gets hold of it. Decryption is the reverse mechanism where the encrypted cipher text is converted back into its original form. Understanding the relationship between encryption and decryption is fundamental to modern cybersecurity and data protection. What is Encryption? Encryption is the procedure of encoding data in cryptography. This procedure turns ...

Read More

What is Cut-through switching?

Moumita
Moumita
Updated on 16-Mar-2026 962 Views

In data communications, cut-through switching is a method of switching data frames or packets where the switching device (bridge or switch) forwards the frames as soon as the destination address is available without waiting for the rest of the data to arrive. Working Principle Cut-through switching is used in packet switching systems. In packet-switching, the message is divided into a number of units called packets that are individually routed from the source to the destination. There is no need to establish a dedicated circuit for communication, since it is a connectionless network switching technique. In cut-through switching, ...

Read More

What are Routers in Computer Network?

Moumita
Moumita
Updated on 16-Mar-2026 54K+ Views

Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are responsible for receiving, analyzing, and forwarding data packets among the connected computer networks. When a data packet arrives, the router inspects the destination address, consults its routing tables to decide the optimal route and then transfers the packet along this route. Router Operating at Network Layer Network A 192.168.1.0/24 ...

Read More

Advantages and Disadvantages of Radio Transmission

Pranavnath
Pranavnath
Updated on 16-Mar-2026 5K+ Views

Radio transmission is a wireless communication method that sends data over long distances using radio waves propagated through the air medium. Radio waves are electromagnetic signals that can travel through various obstacles and cover vast geographical areas, making them ideal for broadcasting and telecommunications. Radio waves operate using Amplitude Modulation (AM) and Frequency Modulation (FM) schemes with specialized antennas. AM signals use lower carrier frequencies for long-distance transmission but sacrifice audio quality, while FM signals provide better sound quality and support stereo transmission with superior bandwidth utilization. Radio Wave Transmission ...

Read More
Showing 12681–12690 of 61,297 articles
Advertisements