Articles on Trending Technologies

Technical articles with clear explanations and examples

Block Cipher Design Principles

Pranavnath
Pranavnath
Updated on 05-May-2023 16K+ Views

Block Cipher is an encryption algorithm that works with a symmetric key in a deterministic way. The plain text is divided into several blocks of equal size. If the length of the plain text does not allow block division of equal size, padding is done over the plain text. His type of encryption method can encrypt on blocks of 128 bits, the key can be 128, 192, or 256 bits. In block ciphers, the length of the plain text is equal to the length of the cipher text. This type of encryption process considered each block at a time and ...

Read More

50 Common Ports You Should Know

Pranavnath
Pranavnath
Updated on 05-May-2023 15K+ Views

Introduction In the world of computer networking, ports play a crucial role in facilitating communication between different devices. A port can be defined as a logical channel through which information streams between two devices. Each port has a unique number assigned to it, known as a port number. Understanding port numbers and their comparing administrations is fundamental for anybody who works with computer systems. In this article, we'll examine 50 of the most common ports that you should know. These ports are assembled into different types based on their characteristics and utilization. We'll investigate their highlights, significance, and centrality in ...

Read More

Bluetooth Modes

Pranavnath
Pranavnath
Updated on 05-May-2023 4K+ Views

Bluetooth is a technology that wirelessly connects with other systems using the radio frequency that uses 2.4 GHz frequency. Bluetooth is accessible up to 10 meters for sharing documents, media, photos, and videos. It avoids the usage of wires making it a wireless technology. It provides a secured data transmission, so the device needs to be paired before any transmission of data. Though a secure connection, the distance for transmission is less compared to today’s emerging technology. Bluetooth divides the data into packets and transmits it through the channels which use frequency hopping spread spectrum. Bluetooth Modes Bluetooth Connection Bluetooth ...

Read More

Basic Frame Structure of HDLC

Pranavnath
Pranavnath
Updated on 05-May-2023 1K+ Views

HDLC stands for High-level Data Link Control which is a collection of the protocol that ensures communication purposes among nodes or network points. It was developed by the International Organization for Standardization (ISO). The data to be transmitted is organized in the form of frames which when transferred to the destination is acknowledged for its appropriate arrival. It can be applied to both point-to-point connections and multipoint connections as it is a bit-oriented protocol. The system of Automatic Repeat Request is implemented via HDLC and also full-duplex communications could be done with the help of HDLC. Due to its ...

Read More

Advantages and Disadvantages of Ethernet

Pranavnath
Pranavnath
Updated on 05-May-2023 4K+ Views

When you see in your organization, there are many computers connected to share data and information, this whole technology is used to connect them in networks such as cables, computers, wires, protocols, and chips, all compose this Ethernet. As it is explained in very simple language to give this a proper definition, Ethernet is a technology used to connect wired computers in a network which is commonly used in Local Area Networks (LAN, MAN, and WAN). Some applications of Ethernet are educational Institutions such as schools, Private learning institutions, Universities, Company offices, Hospitals, etc. Types of Ethernet Cables There ...

Read More

Address Resolution in DNS (Domain Name System)

Pranavnath
Pranavnath
Updated on 05-May-2023 2K+ Views

DNS (Domain Name System) is an essential component of the internet infrastructure that translates human-readable domain names into computer-readable numbers called IP addresses. When you type in a website address in your web browser, then DNS translates into an IP address such as 126.32.0.36 (Assume) this IP address is used by computers for identification and then, they communicate with each other. The process of converting domain names into IP addresses is called address resolution. Address resolution plays a critical role in the functioning of the Internet as it enables users to access websites using easy-to-remember domain names instead of complex ...

Read More

Bluetooth vs Bluetooth Low Energy

Pranavnath
Pranavnath
Updated on 05-May-2023 2K+ Views

Introduction Modern electronic devices now almost always have wireless communication advancements. These two innovations, Bluetooth and Bluetooth Low Energy (BLE) are widely used in a variety of electrical devices. Despite sharing the same central idea, they have some significant differences in terms of usability, run, and control utilization. Although both innovations are founded on the same underlying principles, there are some significant differences between them. We'll look at the differences between Bluetooth and Bluetooth Low Energy in this article, as well as several useful examples. What is Bluetooth? Bluetooth may be a remote communication convention that empowers gadgets to communicate ...

Read More

Approaches to Information Security Implementation

Pranavnath
Pranavnath
Updated on 05-May-2023 6K+ Views

Introduction Information security protects information from disruption, misuse, destruction, disclosure, modification, or unauthorized access. The goal of information security is to protect critical data and privacy both digitally and physically. Information security is abbreviated as InfoSec. The information security adheres to Confidentiality, Integrity, and Availability. Confidentiality − Protect information from unauthorized disclosure of sensitive information. Integrity − The data is to be protected from modification or tampering data by intruders which ensures information is accurate. Availability − The information must be accessible in need of any entity, organization, etc. Other characteristics of Information security are authenticity, accountability, and ...

Read More

How to find the Length of Channel, Pointer, Slice, String and Map in Golang?

Siva Sai
Siva Sai
Updated on 05-May-2023 3K+ Views

In Golang, there are several data types such as channels, pointers, slices, strings, and maps. Each of these data types has a different way of storing and accessing data, and it is essential to know the length or size of each type to manage the memory efficiently. In this article, we will discuss how to find the length of a channel, pointer, slice, string, and map in Golang. Finding the Length of Channel in Golang A channel is a data type used for communication between Goroutines. We can find the length of a channel in Golang by using the len() ...

Read More

How to find the last index value of any element in slice of bytes in Golang?

Siva Sai
Siva Sai
Updated on 05-May-2023 278 Views

In Go, finding the last index value of an element in a slice of bytes can be a common requirement while working with strings and byte arrays. Fortunately, there is a built-in function in Go that allows us to find the last index value of an element in a slice of bytes. In this article, we will discuss how to find the last index value of any element in a slice of bytes in Go. Syntax of LastIndexByte Function The built-in function LastIndexByte returns the index of the last occurrence of the given byte c in the slice of bytes ...

Read More
Showing 22681–22690 of 61,248 articles
Advertisements