Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles on Trending Technologies
Technical articles with clear explanations and examples
Block Cipher Design Principles
Block Cipher is an encryption algorithm that works with a symmetric key in a deterministic way. The plain text is divided into several blocks of equal size. If the length of the plain text does not allow block division of equal size, padding is done over the plain text. His type of encryption method can encrypt on blocks of 128 bits, the key can be 128, 192, or 256 bits. In block ciphers, the length of the plain text is equal to the length of the cipher text. This type of encryption process considered each block at a time and ...
Read More50 Common Ports You Should Know
Introduction In the world of computer networking, ports play a crucial role in facilitating communication between different devices. A port can be defined as a logical channel through which information streams between two devices. Each port has a unique number assigned to it, known as a port number. Understanding port numbers and their comparing administrations is fundamental for anybody who works with computer systems. In this article, we'll examine 50 of the most common ports that you should know. These ports are assembled into different types based on their characteristics and utilization. We'll investigate their highlights, significance, and centrality in ...
Read MoreBluetooth Modes
Bluetooth is a technology that wirelessly connects with other systems using the radio frequency that uses 2.4 GHz frequency. Bluetooth is accessible up to 10 meters for sharing documents, media, photos, and videos. It avoids the usage of wires making it a wireless technology. It provides a secured data transmission, so the device needs to be paired before any transmission of data. Though a secure connection, the distance for transmission is less compared to today’s emerging technology. Bluetooth divides the data into packets and transmits it through the channels which use frequency hopping spread spectrum. Bluetooth Modes Bluetooth Connection Bluetooth ...
Read MoreBasic Frame Structure of HDLC
HDLC stands for High-level Data Link Control which is a collection of the protocol that ensures communication purposes among nodes or network points. It was developed by the International Organization for Standardization (ISO). The data to be transmitted is organized in the form of frames which when transferred to the destination is acknowledged for its appropriate arrival. It can be applied to both point-to-point connections and multipoint connections as it is a bit-oriented protocol. The system of Automatic Repeat Request is implemented via HDLC and also full-duplex communications could be done with the help of HDLC. Due to its ...
Read MoreAdvantages and Disadvantages of Ethernet
When you see in your organization, there are many computers connected to share data and information, this whole technology is used to connect them in networks such as cables, computers, wires, protocols, and chips, all compose this Ethernet. As it is explained in very simple language to give this a proper definition, Ethernet is a technology used to connect wired computers in a network which is commonly used in Local Area Networks (LAN, MAN, and WAN). Some applications of Ethernet are educational Institutions such as schools, Private learning institutions, Universities, Company offices, Hospitals, etc. Types of Ethernet Cables There ...
Read MoreAddress Resolution in DNS (Domain Name System)
DNS (Domain Name System) is an essential component of the internet infrastructure that translates human-readable domain names into computer-readable numbers called IP addresses. When you type in a website address in your web browser, then DNS translates into an IP address such as 126.32.0.36 (Assume) this IP address is used by computers for identification and then, they communicate with each other. The process of converting domain names into IP addresses is called address resolution. Address resolution plays a critical role in the functioning of the Internet as it enables users to access websites using easy-to-remember domain names instead of complex ...
Read MoreBluetooth vs Bluetooth Low Energy
Introduction Modern electronic devices now almost always have wireless communication advancements. These two innovations, Bluetooth and Bluetooth Low Energy (BLE) are widely used in a variety of electrical devices. Despite sharing the same central idea, they have some significant differences in terms of usability, run, and control utilization. Although both innovations are founded on the same underlying principles, there are some significant differences between them. We'll look at the differences between Bluetooth and Bluetooth Low Energy in this article, as well as several useful examples. What is Bluetooth? Bluetooth may be a remote communication convention that empowers gadgets to communicate ...
Read MoreApproaches to Information Security Implementation
Introduction Information security protects information from disruption, misuse, destruction, disclosure, modification, or unauthorized access. The goal of information security is to protect critical data and privacy both digitally and physically. Information security is abbreviated as InfoSec. The information security adheres to Confidentiality, Integrity, and Availability. Confidentiality − Protect information from unauthorized disclosure of sensitive information. Integrity − The data is to be protected from modification or tampering data by intruders which ensures information is accurate. Availability − The information must be accessible in need of any entity, organization, etc. Other characteristics of Information security are authenticity, accountability, and ...
Read MoreHow to find the Length of Channel, Pointer, Slice, String and Map in Golang?
In Golang, there are several data types such as channels, pointers, slices, strings, and maps. Each of these data types has a different way of storing and accessing data, and it is essential to know the length or size of each type to manage the memory efficiently. In this article, we will discuss how to find the length of a channel, pointer, slice, string, and map in Golang. Finding the Length of Channel in Golang A channel is a data type used for communication between Goroutines. We can find the length of a channel in Golang by using the len() ...
Read MoreHow to find the last index value of any element in slice of bytes in Golang?
In Go, finding the last index value of an element in a slice of bytes can be a common requirement while working with strings and byte arrays. Fortunately, there is a built-in function in Go that allows us to find the last index value of an element in a slice of bytes. In this article, we will discuss how to find the last index value of any element in a slice of bytes in Go. Syntax of LastIndexByte Function The built-in function LastIndexByte returns the index of the last occurrence of the given byte c in the slice of bytes ...
Read More