Computer Network Articles

Page 59 of 122

Difference between Traffic Policing and Traffic Shaping

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 1K+ Views

Traffic Policing and Traffic Shaping are two fundamental network traffic management techniques used to control bandwidth utilization and ensure Quality of Service (QoS) in computer networks. Both methods help regulate data flow but use different approaches to handle excess traffic. Traffic Policing Traffic Policing is a network monitoring technique that enforces traffic rate limits by taking immediate action against packets that exceed predetermined rates. It uses a token bucket mechanism where tokens represent bytes of data that can be transmitted. When traffic exceeds the configured rate, policing drops or marks the excess packets rather than queuing them. ...

Read More

Difference between Z-wave and ZigBee

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 1K+ Views

Z-wave and ZigBee are two popular wireless communication protocols designed for home automation and Internet of Things (IoT) applications. Both use mesh networking topology to create reliable, low-power networks that can extend coverage throughout homes and buildings. While WiFi networks transmit data along a single axis and can struggle with thick walls or distant devices, both Z-wave and ZigBee employ mesh networking where devices can relay signals through intermediate nodes, providing better coverage and reliability. Z-wave vs ZigBee Mesh Networks Z-wave ...

Read More

Difference between WiFi and 3G Technology

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 2K+ Views

Both WiFi and 3G technology are wireless technologies widely used for data transmission. WiFi provides high-speed Internet access by connecting nearby devices through hotspots, while 3G technology is a set of standards for wireless mobile communication systems that enable cellular connectivity over wide geographical areas. This article explores the key features of both technologies and examines their fundamental differences to help you understand when to use each one. What is WiFi? WiFi stands for Wireless Fidelity and defines networks based on the 802.11 standards established by IEEE. It allows devices with wireless capability to communicate via radio ...

Read More

Difference between HCL connections and Dropbox

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 338 Views

This article compares HCL Connections and Dropbox, two distinct cloud-based platforms serving different organizational needs. HCL Connections focuses on enterprise collaboration, while Dropbox specializes in cloud storage and file synchronization. HCL Connections HCL Connections is an enterprise collaboration platform originally developed by IBM and acquired by HCL Technologies in 2019. It leverages Web 2.0 technologies to facilitate team collaboration across organizations of all sizes. HCL Connections Enterprise Features Collaboration Teams & Projects Social Networks Knowledge Sharing Integrations ...

Read More

Difference between Backblaze B2 and Jumpshare

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 186 Views

Backblaze B2 and Jumpshare are two distinct cloud storage solutions that serve different purposes and target markets. While both provide cloud storage capabilities, they differ significantly in their approach, features, and intended use cases. Backblaze B2 Backblaze B2 is a cloud storage service designed primarily for developers and businesses requiring scalable, cost-effective object storage. Founded in 2007, Backblaze focuses on providing reliable data backup and storage solutions. Backblaze B2 Cloud Storage Architecture Applications APIs & SDKs B2 Storage Object ...

Read More

Difference between Google Drive and HCL Connections

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 218 Views

We know that different companies have been trying to help people use cloud computing on the Internet in the past few years. As a newbie, it is not easy to choose from the different types of cloud services out there because most of the services are not free, and it might take a tremendous amount of time to try every service. Let us compare two major services: Google Drive and HCL Connections. Note that while Google Drive is primarily a cloud storage service, HCL Connections is an enterprise collaboration platform with different core functionalities. Google Drive Google ...

Read More

Design Issues in Data Link Layer

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 11K+ Views

The Data Link Layer is the second layer in the OSI model, positioned between the physical layer and network layer. It manages node-to-node communication and implements essential functions like error control, flow control, and frame management. This layer provides a reliable service interface to the network layer while handling frame formatting, error detection, and link management. Understanding its design issues is crucial for building efficient network protocols. Data Link Layer Structure Network Layer LLC (Logical Link Control) ...

Read More

Computer Networks – Ransomware Attack on the US Maritime Sector in 2019

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 171 Views

The United States military is considered to be one of the most sophisticated forces in the world. However, it was challenged and called into question by a 2019 ransomware attack on one of the United States' maritime facilities that disrupted critical operations for over 30 hours. The Ryuk Ransomware Attack In December 2019, a Ryuk ransomware attack targeted a US Coast Guard facility, disrupting government operations for more than 33 hours during the holiday season. The incident highlighted vulnerabilities in maritime cybersecurity infrastructure despite existing security protocols based on the NIST Cybersecurity Framework (CSF) and NIST Special Publication ...

Read More

TCP/IP in Computer Networking

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 14K+ Views

TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of communication protocols used for connecting devices on networks, ranging from the global Internet to local intranets and extranets. Despite its name suggesting only two protocols, TCP/IP actually encompasses multiple protocols working together to enable reliable data communication. The modern Internet applications and services we use daily are made possible by the TCP/IP protocol suite, which provides the foundation for network communication worldwide. How TCP/IP Works TCP/IP operates through a coordinated process where each protocol handles specific aspects of data communication: TCP (Transmission Control Protocol) manages ...

Read More

Denial-of-Service (DoS) Attack and its Types

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 9K+ Views

A Denial-of-Service (DoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. The attack renders the service unavailable to legitimate users by exhausting system resources such as bandwidth, memory, or processing power. DoS attacks typically target high-profile organizations including banks, e-commerce platforms, media companies, and government websites. While these attacks rarely result in data theft, they can cause significant financial losses and operational disruption for the targeted organization. DoS Attack Overview ...

Read More
Showing 581–590 of 1,219 articles
« Prev 1 57 58 59 60 61 122 Next »
Advertisements