Found 66 Articles for Communication

Explain Parameter passing Semantics in RPC

Satish Kumar
Updated on 29-Sep-2023 12:41:04

1K+ Views

Remote Procedure Call (RPC) is a communication protocol that enables a process running on one computer to invoke a procedure in another process running on a remote computer. procedure call appears to caller as a local procedure call, but in reality, call is transmitted over a network. RPC involves several aspects such as marshaling of parameters, handling of return values, and communication between client and server. In this article, we will focus on parameter passing semantics in RPC. We will discuss various parameter passing methods and their characteristics, including pass-by-value, pass-by-reference, pass-by-result, and pass-by-object-reference. We will also provide examples to ... Read More

Examples of TCP and UDP in Real Life

Satish Kumar
Updated on 27-Sep-2023 15:20:39

4K+ Views

Introduction TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of most commonly used internet protocols. They are both responsible for ensuring reliable data transfer between devices connected to a network. However, way they do so differs significantly. In this article, we will discuss some examples of TCP and UDP in real life applications. TCP in Real Life TCP is a connection-oriented protocol that is commonly used when reliability is primary concern. It is responsible for establishing a reliable and ordered data transfer between two devices. Some examples of TCP in real life applications are as follows − ... Read More

Evolution of Networks

Satish Kumar
Updated on 27-Sep-2023 15:19:22

1K+ Views

Introduction Human beings are social animals. They have always found ways to communicate and connect with each other. From ancient times, people used various forms of communication like writing, oral communication, and visual arts to convey their messages to others. With advent of technology, communication has become faster, easier, and more efficient. This led to development of networks that connected people across world. In this article, we will explore evolution of networks from ancient times to modern era. Ancient Networks Ancient networks were primarily based on oral communication and visual arts. In ancient civilizations like Sumerians, Egyptians, and Greeks, people ... Read More

Ethernet Transmitter Algorithm

Satish Kumar
Updated on 27-Sep-2023 15:05:38

439 Views

Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data is transmitted over Ethernet network. In this article, we will discuss Ethernet transmitter algorithm, its subheadings, and examples. Overview of Ethernet Transmitter Algorithm The Ethernet transmitter algorithm is a set of rules that governs transmission of data packets over an Ethernet network. algorithm ensures that data packets are transmitted in ... Read More

EtherChannel in Computer Network

Satish Kumar
Updated on 27-Sep-2023 14:53:54

611 Views

Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique used in computer networks to combine multiple physical links into a logical link. goal is to increase available bandwidth and provide redundancy, fault tolerance, and load balancing. In an EtherChannel, multiple physical links are bundled together, appearing as a single logical link to network devices connected to it. Benefits of ... Read More

ADD PPP Command in PPP Configuration

Satish Kumar
Updated on 05-Nov-2024 15:08:18

316 Views

Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session between two devices. One such command is "ADD PPP" command. In this article, we will discuss ADD PPP command in PPP configuration, its significance, and various examples of its usage. What is ADD PPP Command? The ADD PPP command is a configuration command used to create a new PPP session ... Read More

Active Directory PenTesting

Satish Kumar
Updated on 05-Nov-2024 15:17:18

888 Views

In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be tested is the organization's Active Directory (AD). This article will discuss Active Directory pen testing, why it is essential, and some examples of AD vulnerabilities. What is Active Directory? Active Directory is a directory service developed by Microsoft for managing and organizing information about users, computers, and other resources in ... Read More

Access Control Tactics in Computer Networks

Satish Kumar
Updated on 27-Sep-2023 13:36:09

916 Views

In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources in a computer network. This article explores access control tactics in computer networks, including their types and examples. Types of Access Control Tactics Access control tactics can be broadly classified into two types − physical access control and logical access control. Physical Access Control Physical access control is a security ... Read More

60 Hz vs 144 Hz Does it matter

Satish Kumar
Updated on 27-Sep-2023 11:59:35

1K+ Views

Introduction When it comes to gaming monitors, one of key specifications that is often discussed is refresh rate. A monitor's refresh rate determines how many times per second screen is updated with new information. two most popular refresh rates are 60 Hz and 144 Hz. While many gamers swear by benefits of a 144 Hz monitor, others argue that difference is negligible. In this article, we will explore differences between 60 Hz and 144 Hz and help you decide which one is right for you. What is Refresh Rate? Before we delve deeper into topic, let's first understand what refresh ... Read More

4G Mobile Communication Technology

Satish Kumar
Updated on 27-Sep-2023 11:50:15

950 Views

Introduction Mobile communication technology has undergone significant advancements in recent years, and 4G mobile communication technology is one such example. 4G or Fourth-generation mobile communication technology is most recent and advanced version of mobile communication network that provides better speed, capacity, and coverage than its predecessors. It was first introduced in 2010 and quickly gained popularity worldwide due to its high-speed internet connectivity and better user experience. In this article, we will discuss features, benefits, and limitations of 4G mobile communication technology. Features of 4G Mobile Communication Technology The following are key features of 4G mobile communication technology − High-Speed ... Read More

Advertisements