- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1627 Articles for Computer Network
27K+ Views
A sliding window is also known as windowing. A sliding window is a method for controlling sending data packets between two network devices where dependable and sequential delivery of data packets is needed, such as using the Data Link Layer (OSI model) or Transmission Control Protocol (TCP).In the sliding window technique, each data packet (for most data link layers) and byte (in TCP) includes a unique consecutive sequence number used by the receiving computer to place data in the correct order. The objective of the sliding window technique is to use the sequence numbers to avoid duplicate data and to ... Read More
596 Views
MQTT represents Message Queuing Telemetry Transport. It is a highly lightweight and publish-subscribe messaging transport protocol. This protocol is helpful for the connection with the remote location where the bandwidth is a premium. These features make it useful in multiple situations, including a stable environment such as communication machine to machine and the internet.MQTT was initially invented and developed by IBM in the late 1990s. Its original application was to link sensors on oil pipelines with satellites. It is a messaging protocol that provides asynchronous communication between parties. An asynchronous messaging protocol decouples the message sender and receiver in both ... Read More
11K+ Views
I2C stands for the inter-integrated controller. This is a serial communication protocol that can connect low-speed devices. It is a master-slave communication in which we can connect and control multiple slaves from a single master. In this, each slave device has a specific address.The I2C is developed to overcome the complexities of transmitting data through other communication protocols, including Universal Asynchronous Receiver Transmitter (UART) and Serial Peripheral Interface (SPI).UART is an asynchronous transmission protocol. It is a device using them that should agree ahead of time on a data cost. The clocks of the machines should also have clocks with ... Read More
1K+ Views
Windows NT was produced by Microsoft in July 1993. Its 1st version was Windows NT 31 and windows 31 advanced server. It is processor independent multiprocessing, multiuser and component based on 2000.FeaturesThere are various features of Windows NT, which are as follows −It implements pre-emptive multitasking and multithreading operations.It supports multiple CPU systems with SMP (Symmetric Multiprocessing technology).Its security meets the US Department of Defence’s C2 standard.The NT system is a popular network operating system because of its low price, strong application service capability, high performance, and rich software.It supports various hardware platforms such as CISI (Intel system) and RISC ... Read More
1K+ Views
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic such as viruses and hackers.There are various types of firewalls in a computer network, which are as follows −Packet Filtering FirewallsA packet filtering firewall is an essential type of firewall. It facilitates a management program that monitors web traffic and filters incoming packets based on configured security methods.These ... Read More
1K+ Views
A firewall is a network security tool that monitors incoming and outgoing network traffic and determines whether to allow or block definite traffic based on a defined collection of security rules.The primary purpose is to enable non-threatening traffic and avoid malicious or unwanted data traffic for protecting the system from viruses and attacks. A firewall is a cybersecurity device that filters network traffic and supports users to block malicious software from creating the Internet in infected computers.Software vs Hardware FirewallsFirewalls can be hardware or software. In addition to reducing access to a protected device and network, a firewall can chunk ... Read More
2K+ Views
VLAN stands for Virtual LAN. It is a logical grouping of network devices. When we create VLAN, we break the large broadcast domain into smaller broadcast domains. Consider VLAN as a subnet. The same as two different subnets cannot communicate without a router, and different VLANs also require the router to transmit.FeaturesThere are various features of VLAN, which are as follows −Virtual LANs offer structure for creating groups of devices, even if their networks are different.It can raise the broadcast domains possible in a LAN.VLANs can be performing VLANs reduces the security risks as the number of hosts connected to ... Read More
4K+ Views
RMON stands for Remote Network Monitoring. It is an extension of the Simple Network Management Protocol (SNMP) that allows detailed monitoring of network statistics for Ethernet networks.RMON was initially developed to address remote site and local area network (LAN) segment management from a centralized location. The RMON standard determines a group of functions and statistics exchanged between RMON compatible network probes and console managers.ROM VersionsThere are two ROM Versions which are as follows −RMON1 MIBIt has defined 10 MIB groups for basic network monitoring. It operates on the MAC layer and the physical layer.Statistics MIB Group − It contains a ... Read More
2K+ Views
MIB stands for Management Information Base. It is a hierarchical virtual database of network (or other entity) objects describing a device being monitored by a network management system (NMS). A MIB can be used by Simple Network Management Protocol (SNMP) and remote monitoring 1 (RMON1).The MIB database of objects is intended to reference a complete collection of management information on an entity, such as a computer network; however, it is often used to refer to a subset of the database and is often called a MIB module.It is a virtual database used to define the functional and operational aspects of ... Read More
3K+ Views
SMI stands for Structure of Management Information. It defines the rules for describing managed objects. In the SNMP framework, managed objects reside in a virtual database called the management information base (MIB). Collection of related objects are defined in MIB modules. The modules are written using a subset of abstract syntax notation, describing the data structures in a machine-dependent language.SNMP uses a basic encoding rule to transmit the data structure across the network without ambiguity. There are several data types that are allowed in SMI are integers, octet string, NULL & object, identifier, user-defined data types based on application.Primitives (Integer, ... Read More
To Continue Learning Please Login
Login with Google