Computer Network Articles

Page 119 of 122

IEEE 802.3 and Ethernet

George John
George John
Updated on 16-Mar-2026 48K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in the 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two main categories: classic Ethernet and switched Ethernet. Classic Ethernet is the original form providing data rates between 3 to 10 Mbps, commonly referred to as 10BASE-X variants. Switched Ethernet uses switches to connect stations in the LAN, replacing repeaters and allowing full bandwidth utilization. IEEE 802.3 ...

Read More

TCP 3-Way Handshake Process

Urmila Samariya
Urmila Samariya
Updated on 16-Mar-2026 80K+ Views

Transmission Control Protocol (TCP) provides a secure and reliable connection between two devices using the 3-way handshake process. TCP uses a full-duplex connection to synchronize (SYN) and acknowledge (ACK) each other on both sides. There are three steps for both establishing and closing a connection: SYN, SYN-ACK, and ACK. The 3-way handshake ensures that both client and server are ready for data transmission and agree on initial sequence numbers for reliable data ordering and flow control. Connection Establishment Process The following diagram illustrates how a reliable connection is established using the 3-way handshake between a client and ...

Read More

Introduction to Host Names: Understanding the Basics

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 736 Views

In the world of computers and the internet, host names are a critical component of how devices connect to each other. A host name is a unique identifier assigned to a device or server on a network, used to identify and locate devices on the internet or any other network. What is a Host Name? A host name is a label assigned to a device on a network. It consists of a combination of letters, numbers, and hyphens, usually assigned by an administrator or network manager. Host names are case-insensitive, meaning "mydevice" and "MyDevice" are treated as identical. ...

Read More

Explain the functions of a Physical Layer

Ginni
Ginni
Updated on 16-Mar-2026 5K+ Views

The physical layer is the lowest layer in the OSI model that handles the actual transmission of raw bits over a physical communication channel. It establishes, maintains, and terminates physical connections between devices, converting digital data into electrical, optical, or radio signals. The physical layer provides services to the data link layer and operates at the bit level, managing the electrical signal transmission over the physical medium. It can establish either point-to-point or point-to-multipoint physical connections. Physical Layer Connection Types Point-to-Point ...

Read More

Near Field Communication

Satadru Jati
Satadru Jati
Updated on 16-Mar-2026 610 Views

Near Field Communication (NFC) is a short-range wireless communication technology that enables two electronic devices to establish communication when placed in close proximity, typically within a few centimeters. NFC is an extension of Radio Frequency Identification (RFID) technology and operates at a frequency of 13.56 MHz. NFC technology enables contactless communication and data exchange between devices, making it convenient and efficient for various applications such as mobile payments, access control, and data sharing. NFC Communication Range Phone ...

Read More

Difference between Internet and World Wide Web

Shirjeel Yunus
Shirjeel Yunus
Updated on 16-Mar-2026 4K+ Views

Many people use the terms Internet and World Wide Web (WWW) interchangeably, but they are fundamentally different concepts. The Internet is the underlying infrastructure that enables global connectivity, while the WWW is a service that runs on top of this infrastructure. What is the Internet? The Internet is a global network of interconnected computers that communicate using standardized protocols. It serves as the foundation for various services including email, file transfer, remote access, and the World Wide Web. The Internet uses physical infrastructure such as optical fibers, copper wires, and wireless technologies to connect devices. It operates ...

Read More

Multi-access Channels and Random Access Channels

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 1K+ Views

Multi-access channels are network channels that allow several transmitters to communicate with a common receiver via a shared channel. These channels are also called multiple access (MAC) channels. The network channel may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum. In multi-access environments, efficient coordination is essential to prevent data collisions and ensure all users can transmit their information successfully without interference. Random Access Channels Random-access channels (RACH) are shared channels used in wireless communication systems to allow mobile devices for call set-up. RACH also handles bursty data ...

Read More

Operating System Based Virtualization

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 3K+ Views

Operating System-based Virtualization is a virtualization technique where virtualization software runs on top of a host operating system, creating isolated environments called containers. This approach allows multiple applications or services to run independently on the same physical hardware while sharing the underlying OS kernel. The virtualization layer creates abstraction between the hardware and applications, enabling better resource utilization and isolation. Unlike traditional virtualization that creates complete virtual machines, OS-based virtualization shares the host kernel among containers, making it more lightweight and efficient. Operating System-Based Virtualization Architecture Physical Hardware ...

Read More

Explain the 3’A of open source security

Pranavnath
Pranavnath
Updated on 16-Mar-2026 404 Views

In the realm of cybersecurity, open source security has emerged as a guiding framework for organizations seeking to protect their digital infrastructure. Open source security emphasizes collaboration, transparency, and shared responsibility, transcending the boundaries of proprietary solutions. Central to this paradigm are the three A's of open source security: Adopt, Act, and Assess. These principles form a comprehensive approach to strengthening digital defenses and maintaining a proactive stance against evolving cyber threats. The 3 A's of Open Source Security ADOPT Embrace secure ...

Read More

The Secret Cybersecurity Battle: Plaintext vs Cleartext - Which Side are You on?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

Plaintext and cleartext are fundamental concepts in cybersecurity and cryptography that are often confused but have distinct meanings. Understanding these differences is crucial for implementing effective data protection strategies and maintaining secure communications. Both terms refer to unencrypted, human-readable data, but their usage contexts and implications vary significantly in security implementations. Understanding Plaintext and Cleartext Plaintext refers to unencrypted data that serves as input to an encryption algorithm or output from a decryption process. It represents the original, readable format of information before encryption transforms it into ciphertext. Cleartext denotes unencrypted data in its transmission or ...

Read More
Showing 1181–1190 of 1,220 articles
Advertisements