Long Polling, WebSockets, Server-Sent Events (SSE) and Comet Explained

Ayushi Bhargava
Updated on 28-Oct-2021 06:27:05

721 Views

Long-Polling, Websockets, Server-Sent Events (SSE), and Comet are some of the ways for the client-side to connect with the server-side in real-time. These are discussed in the next paragraphs.Long PollingThis is a technique in which a client asks for information from a server but does not anticipate a response right away. It entails sending an HTTP request to a server and then leaving the connection open to allow the server to reply later. The server enables about 6 simultaneous connections from the browser using extended polling.In comparison to other methods, load balancing is simple in this case. Long polling is ... Read More

Web Caching and Conditional GET Statements

Ayushi Bhargava
Updated on 28-Oct-2021 06:25:30

2K+ Views

What is Web Caching?The activity of saving data for reuse, such as a copy of a web page supplied by a web server, is known as web caching.It is cached or saved the first time a user accesses the page, and a cache will deliver the copy the next time a user requests the same page, preventing the origin server from becoming overwhelmed.Web caching techniques dramatically improve page delivery speed and reduce the amount of work required of the backend server.Caching servers can be configured to refresh at predetermined intervals or in response to specified events to guarantee that only ... Read More

Difference Between Authentication and Authorization

Ayushi Bhargava
Updated on 28-Oct-2021 06:24:53

1K+ Views

What is Authentication?Authentication is the act of establishing the same claim as users identify on a computer system. As opposed to identification, authenticity is the process of verifying a person's or thing's identification. Personal identification must be validated, the website's validity must be validated with a digital certificate, the relic must be carbon dated, and the product or document must not be counterfeit.The process of determining the claimed user is known as authentication. This is the first stage of the security procedure. Completing the authentication procedure in less than or equal to −The password − The most popular authentication factors ... Read More

Xmodem File Transfer Protocol

Ayushi Bhargava
Updated on 28-Oct-2021 06:23:14

2K+ Views

XMODEM is a standard file transfer process developed by Ward Christensen in 1977. It sends data-related data blocks and awaits receipt of block receipt. XModem is used in both hardware and software.XMODEM is a half-dup communication protocol with an effective error detection device.It violates the original data in a series of packets sent to the recipient and other information that allows the recipient to determine whether the packets have been received correctly.Marked files are completed with the end-of-file character sent behind the last block. This character is not in the packet but is sent as a single byte.Since the lengths ... Read More

What is Wireless Application Protocol (WAP)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:22:05

2K+ Views

WAP is a collection of communication protocols meant to standardise how wireless devices, such as mobile phones and radio transceivers, may access the Internet and its services, such as email and newsgroups. Prior to the advent of WAP, Internet connection was available, but various manufacturers utilised different technologies; WAP promised compatibility across these technologies.WAP was created in 1997 at the WAP Forum by Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). The WAP Forum was renamed the Open Mobile Alliance in 2002. (OMA).Operation of the WAPWAP is an acronym for a collection of protocols. WAP hardware, such as WAP-enabled web ... Read More

What is E-Governance?

Ayushi Bhargava
Updated on 28-Oct-2021 06:21:14

3K+ Views

E-governance offers vital opportunities to employ electronic means to push sensible governance. It applies data technology to government processes and functions to attain easy, ethical, accountable, and clear governance. This includes the dissemination of data, and quick and effective communication.With the formation of a lot of comprehensive and multi-stakeholder approaches, e-governance continues to incorporate electronic interactions, particularly interactions from government and non-governmental organizations.Benefits of e-GovernanceFollowing are some of the benefits of applying e-Governance −Reduced corruptionHigh transparencyIncreased convenience Growth of GDPDirect involvement of componentsReduction of total costsParticipating in the scope of the Government of e-overnight, the government plans to increase the ... Read More

WiMAX in Computer Network

Ayushi Bhargava
Updated on 28-Oct-2021 06:19:57

3K+ Views

What is WiMAX?WiMAX stands for "Worldwide Interoperability for Microwave Access, " a telecommunications standard that describes fixed and fully mobile Internet access services. The protocol follows some aspects of the IEEE 802.16 Standard.WiMAX products and services are most likely to be found in "last mile" applications. WiMAX enables ISPs and carriers to deliver Internet access to homes and businesses without the need for physical cabling (copper, cable, etc.) to reach the customer's location.Difference between WiMAX and WiFiWiMAX is sometimes compared to WiFi because both technologies rely on wireless Internet connectivity and are complementary.Following are some of the major differences between ... Read More

What is a Wireless Local Loop (WLL)

Ayushi Bhargava
Updated on 28-Oct-2021 06:18:08

14K+ Views

Wireless Local Loop (WLL) is a generic word for an access system that connects users to the local telephone company's switch via wireless links rather than traditional copper cables. This system, also known as fixed wireless access (FWA) or fixed radio, provides telephone, facsimile, and data services to business and residential subscribers using analog or digital radio technology.WLL systems enable the rapid deployment of basic phone service in areas where geography or telecommunications development makes traditional wireline service prohibitively expensive.WLL systems are easy to integrate with a modified public telephone network (PSTN), and they can usually be installed within a ... Read More

Working and Types of Smart Card

Ayushi Bhargava
Updated on 28-Oct-2021 06:14:45

1K+ Views

What is a Smart Card?A smart card is a compact microprocessor-based device the size of a credit card that stores and processes data. Smart cards have mostly supplanted conventional magnetic cards since they can store more data and perform more functions. Smart cards are now used in various industries, including retail, public transportation, and security.Smart card manufacturers can put small circuits and circuitry on a printed card using modern technologies such as electron beam lithography. As data storage technology progresses, manufacturers will continue to increase the functionality of smart cards by working with nanoscale components of these cards.It is feasible ... Read More

What is Vishing (Voice Phishing)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:13:33

299 Views

The use of telephony (typically Voice over IP telephony) to perform phishing attacks is known as voice phishing or vishing.Landline telephone services are typically reliable because they are terminated at recognized physical locations and are associated with a bill-payer. However, contemporary Voice over IP (VoIP) technologies like caller ID spoofing and automated systems (IVR) are frequently used by vishing criminals to evade detection by law enforcement authorities. Voice phishing is commonly used to acquire credit card numbers or other personal information from individuals for use in identity theft operations.Voice phishing assaults are often carried out via automated text-to-speech systems that ... Read More

Advertisements