Computer Network Articles

Page 10 of 122

CISM vs CISSP Certification

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 710 Views

Information security is a critical aspect of any organization, and it is essential to have certified professionals who can manage and protect sensitive data. Two of the most popular certifications in the field of information security are CISM (Certified Information Security Manager) and CISSP (Certified Information Systems Security Professional). Both certifications are globally recognized and highly respected in the industry, but they have different focuses and target audiences. Target Audience CISM is designed for experienced information security professionals who manage and oversee information security programs. It is ideal for those who have at least five years of experience ...

Read More

Performance Problems in Computer Networks

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

Network performance refers to the quality and speed of a network's transmission of data between devices. It is typically measured by factors such as bandwidth, latency, and throughput. Network performance is critical because it determines how effectively devices can communicate and access shared resources like internet services or file servers. Poor network performance leads to slow response times, reduced productivity, and frustrated users. Common Network Performance Problems Bandwidth Bottlenecks Insufficient capacity Interference Signal ...

Read More

CAN Protocol

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 32K+ Views

The Controller Area Network (CAN) protocol is a robust communication protocol originally developed for the automotive industry but now widely used across various sectors including industrial automation, medical equipment, and avionics. It is a serial communication protocol that implements a multi-master, distributed control system where any device (node) on the network can initiate communication. The protocol enables devices to share information and synchronize actions without requiring a central controller. CAN uses collision detection and arbitration methods to ensure only one node transmits at a time, preventing data collisions on the shared bus. Why CAN? The CAN protocol ...

Read More

Bifid Cipher in Cryptography

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

The Bifid Cipher is a polygraphic substitution cipher invented by French amateur cryptographer Felix Delastelle in the late 19th century. Unlike monoalphabetic ciphers such as the Caesar Cipher, it encrypts pairs of letters at a time, making it significantly more secure. The cipher is based on a Polybius square, a 5×5 grid containing the alphabet (usually combining I and J into one cell). The grid is typically filled using a keyword first, followed by the remaining letters of the alphabet in order. Polybius Square with Keyword "CRYPTO" ...

Read More

Berkeley's Algorithm

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 7K+ Views

Berkeley's Algorithm is a distributed algorithm for computing the correct time in a network of computers. The algorithm is designed to work in a network where clocks may be running at slightly different rates, and some computers may experience intermittent communication failures. The basic idea behind Berkeley's Algorithm is that each computer in the network periodically sends its local time to a designated master computer, which then computes the correct time for the network based on the received timestamps. The master computer then sends the correct time back to all the computers in the network, and each computer adjusts ...

Read More

Cable TV Networks

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

Cable television networks are television channels that are delivered to viewers through cable television systems, as opposed to broadcast television, satellite television, or the internet. Some examples of popular cable TV networks in the United States include ESPN, TNT, and HBO. Cable networks can also be divided into categories, such as news networks (CNN, Fox News), sports networks (ESPN, NBC Sports), movie networks (HBO, Showtime), and lifestyle networks (Food Network, HGTV). Cable networks operate by subscription where viewers pay the operator to get access to the channels. The cable television infrastructure uses coaxial cables or fiber-optic cables to deliver ...

Read More

What is Webmail?

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

Webmail is a type of email service that allows users to access and manage their email messages through a web browser. Instead of using a dedicated email client like Microsoft Outlook or Apple Mail, users can log in to their email account using a web-based interface and perform tasks like reading and sending email, organizing messages into folders, and managing their contacts. Webmail is convenient because it can be accessed from any device with an internet connection and a web browser, without the need to install any software. This makes it particularly useful for users who need to access ...

Read More

How to Prevent Broken Access Control?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

As more and more services move online, the importance of access control becomes increasingly clear. Access control refers to the processes that limit the ability of unauthorized individuals or entities to access resources, whether those resources are software, data, or physical spaces. Broken access control is one of the most common vulnerabilities in software, and it's also one of the most damaging. In this article, we'll explore what broken access control is, what its consequences can be, and most importantly, how to prevent it. What is Broken Access Control? Broken access control refers to a situation in which ...

Read More

Types of Viruses

Pranavnath
Pranavnath
Updated on 16-Mar-2026 9K+ Views

A computer virus is a type of malicious code that enters the system along with files or programs and carries out malfunctions in the system. The virus-affected program becomes a replica of the existing program. They enter the system through files and when the file runs, the virus also runs in the background. Viruses infiltrate systems through various methods including email attachments, clicking malicious advertisements, and downloading software from unauthorized websites. Their main objective is to spread across different hosts while stealing personal data and system credentials. Types of Computer Viruses A virus is a specific type ...

Read More

Transmission mode

Pranavnath
Pranavnath
Updated on 16-Mar-2026 7K+ Views

Communication is defined as the transfer or sharing of data between any two individuals through a medium and the medium can be wired or wireless. In a computer network, the OSI (Open System Interconnection) model has seven layers for the communication networks. The first layer of OSI is the Physical layer that uses the Transmission mode for transferring the raw data to other devices using a physical medium. Transmission mode refers to the process of transferring data from one point to another over a particular network. The channel between the two devices can be buses or networks, and communication ...

Read More
Showing 91–100 of 1,220 articles
« Prev 1 8 9 10 11 12 122 Next »
Advertisements