
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1515 Articles for Computer Network

452 Views
Layered ArchitectureA layered architecture splits a system into many groups, each of which contains code that addresses a specific issue area, and these groups are referred to as layers.The majority of enterprise-level apps have a three-layer high-level application architecture.The Presentation layerThe Business layerThe Persistence layerWhat is a Callback?A callback, sometimes known as a "call-after" function in computer programming, is any executable code that is supplied as an argument to other code, with the expectation that the other code will call back (execute) the input at a specific time. This execution can take place at once, as in a synchronous callback, ... Read More

2K+ Views
SMiShingWith the widespread usage of cellphones, smishing has grown more prevalent. Short Message Service (SMS) is used by SMiShing to transmit fraudulent text messages or links. By calling, the crooks deceive the user. Victims may provide sensitive information like credit card numbers, account numbers, and so on. When a user visits a website, he or she may unwittingly download malware that infects the device.War DrivingWar driving is a method employed by attackers to locate entrance points wherever they are. They may drive about and acquire a massive quantity of information in a short period of time because of the availability ... Read More

2K+ Views
VPN is an abbreviation for Virtual Private Network. It allows a person to safely and discreetly connect to a private network over the Web. VPN establishes a secure channel known as a VPN tunnel, through which all Internet traffic and conversation is routed.Remote Access VPNA Remote Access VPN allows people to connect to a private network and remotely access all of its resources and services. The person's connection to the private network is made over the Internet, and the connectivity is safe and confidential. Remote Access VPN is beneficial to both residential and business users.While away from the office, a ... Read More

2K+ Views
A Palindrome is a word, phrase, or sequence that reads the same backward as forward, e.g., "madam" or "nurses run".TCP Client-Server ProgramClient and server configuration in which a client connects transmits a string to the server, and the server displays the original string and sends a confirmation to the client through socket connection whether the string is a palindrome or not.Input − WOWOutput − PalindromeInput − soapOutput − Not PalindromeHow Does It Work?First, establish a client-server connection.After the connection is established, the client utilizes the send system function to deliver the user input string to the server.The server will wait ... Read More

2K+ Views
Layer 3 or the Network layer employs IP, or Internet Protocol, which is a connectionless protocol that processes each packet independently, resulting in a lack of transmission dependability. When data is transmitted from one host to another, each packet, even though it belongs to the same session, may travel a distinct path. This implies that the packets could or might not arrive in the correct order. As a result, IP’s dependability is reliant on higher-layer protocols.Transmission Control Protocol (TCP)TCP is a protocol that allows data to be sent from one computer to another. TCP is a layer 4 protocol that ... Read More

16K+ Views
Secure Sockets LayerSecure Sockets Layer (SSL) is a standard technique for transmitting documents securely across a network. SSL technology, created by Netscape, establishes a secure connection between a Web server and a browser, ensuring private and secure data transmission. SSL communicates using the Transport Control Protocol (TCP).The term "socket" in SSL refers to the method of sending data via a network between a client and a server.A Web server requires an SSL certificate to establish a secure SSL connection while using SSL for safe Internet transactions. SSL encrypts network connection segments atop the transport layer, a network connection component above ... Read More

7K+ Views
SONET is a standardized digital communication protocol that uses a fiber optic medium to transfer huge amounts of data across great distances. Multiple digital data streams are transmitted via optical fiber at the same time utilizing LEDs and laser beams in SONET.Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) are established protocols that use lasers or highly coherent light from light-emitting diodes to transport multiple digital bit streams simultaneously across optical fiber (LEDs). Data can also be transmitted over an electrical link at modest transmission rates. The technique was created to replace the plesiochronous digital hierarchy (PDH) system for ... Read More

7K+ Views
What is an Information System?A formal, sociotechnical organizational system designed to gather, process, store, and disseminate information is known as an information system (IS). Information systems comprise four components from a sociotechnical standpoint − task, people, structure (or roles), and technology.Information systems consist of members that gather, store, and process data, with the data being utilized to give information, add to knowledge and create digital products that aid decision-making.Organizational levels, data mode, processing, system objectives, and type of assistance given are all used to classify information systems.Types of Information SystemThe following images shows the types of Information Systems −Transaction Processing ... Read More

3K+ Views
Many companies have prioritized migration to IPv6 since there is practically no inventory of IPv4 addresses left. However, switching to IPv6 without a lengthy transition procedure is next to impossible. This is due to the fact that IPv6 has never been backward compatible with IPv4. This implies that when hosts and routers are upgraded to IPv6, the old system continues to function alongside the new one without requiring any additional adjustments.Network Transition from IPv4 to IPv6Here are a few techniques for easing the transition between IPV4 and IPV6 systems to tackle the problem of interoperability.Dual-stackWhen switching from IPv4 to IPv6, ... Read More

329 Views
A Sybil Attack subverts a network service's reputation system by establishing a large number of pseudonymous identities and using them to wield disproportionately great power. It's called after Sybil, the protagonist of the novel Sybil, which is a case study of a lady diagnosed with a dissociative identity disorder. Sock puppetry is another term for Sybil assaults.In computer security, a Sybil Attack is a method of subverting a reputation system by establishing numerous identities. The vulnerability of a reputation system to a Sybil attack is determined by how cheap identities can be generated and the extent to which the reputation ... Read More