
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1515 Articles for Computer Network

4K+ Views
Repeater is an electronic device that receives a signal to increase its power and retransmit it. They are used for long-distance transmission or received on the other side. We know Networking Architecture has a 7-layer OSI model, where repeaters and devices come at the physical layer. Repeaters are also called Signal boosters. They are cheap and easy solutions for a network device that has no impact on the performance of the network. They are useful in boosting the signal and retransmitting the signal from the transmitter to the receiver. During transmission, certain signals get lost and distorted. Repeaters are connected ... Read More

3K+ Views
Access Control is a set of rules that controls the access of stations to the transmission link. Broadcast links require access control, this is because the link is shared among several stations in broadcast channels. There are many access control methods among those TDMA (Time Division Multiple Access) is the simple one which states that some fixed time slot is allocated for all the stations in a Round Robin manner. And each station transfers its data in its time slot if available. Otherwise, that time slot is wasted. In this article, we will be explaining the advantages and disadvantages of ... Read More

3K+ Views
In the world of computer networks, IP addresses play a super important role in establishing connectivity between devices. An IP address is a unique identifier assigned to each device connected to a network, allowing It to communicate with other devices, at the same choosing static IP is costly for small businesses because whether you want or not you have to buy some extra or some fewer chunks of IP address unnecessarily in static IP addressing. In this article, we will be focusing on the advantages and disadvantages of choosing a Static IP addressing. Advantages Easier Network Management − With ... Read More

5K+ Views
Network address translation (NAT) is a widely used technology in networking that enables devices on a private network to communicate with devices on the internet. NAT translates the Private IP addresses used on a local network into a public IP address that can be recognized and routed over the internet. In this article, we will examine the advantages and disadvantages of NAT. private IP addresses are limited and to save them scientists have given the concept of private IP addresses. But private IPs can’t have recognized on WWW so one medium is there which converts private IP to public IP ... Read More

10K+ Views
The common gateway interface is the middleware in which the web servers execute the user request from an external program. Such programs are called CGI programs. CGI provides the framework for the programs on interaction with HTTP(Hyper text transfer Protocol) server. The user request through forms is passed on to the application program which processes the data and may give a confirmation message back. This process is called as Common Gateway Interface. Overview Definition The Common Gateway Interface is the standard interface between the WWW consortium and the external program. The CGI(Common Gateway Interface) is an executable program that is ... Read More

424 Views
The way we access the internet has been completely transformed by wireless technologies. We no longer live without wifi, which has made it possible to link some gadgets wirelessly to the internet. Yet, because wireless networks are intrinsically less secure than wired networks, numerous security protocols have been created to address this issue. WiFi Protected Access is one such protocol (WPA). Wired Equivalent Privacy (WEP), a security protocol, was intended to be replaced by WPA once it was discovered to be attackable. WPA was first introduced in 2003, and it immediately emerged as the de facto wireless network security protocol. ... Read More

466 Views
WiFi Calling can be considered the Future of Telecommunications as being connected is become a requirement in the fast-paced world we live in. Traditional calling techniques are now obsolete since smartphones have become so ingrained in our lives. The use of WiFi calling is the telecommunications of the future and is spreading like wildfire over the globe. We will go over WiFi calling in this article, including its functions. The concept behind WiFi Calling Instead of using their cellular network, users can utilize the WiFi calling capability to make and receive phone calls and text messages using a wireless internet ... Read More

903 Views
OSI termed Open Systems Interconnect is developed in the year 1983 by ISO (International Organization for Standardization) professionals and it has been declared as an international standard of communicating through the network in later 1984. This model consists of seven layers of abstraction which are used for the transmission of data from a device through the channel to another device. Each layer is designed to do its task by getting data in the form of bits or packets and then forwarding the processed data to the upper layers in the architecture. Architecture designed in the OSI model helps the network ... Read More

1K+ Views
Before knowing which connection is best for internet usage Fiber, Copper, or wireless, we need to know the connections available and their functionality in different environments. The connection that the user selects depends on the usage, cost, installation location, services needed from the internet, and speed of data transfer when uploading or downloading a file or large volumes like movies, software tools, applications, etc. All types of internet connection depend on the bandwidth on how many units (represented by Mbps or Gbps per second) are used for streaming any live video or how frequently the user downloads or accesses cloud ... Read More

534 Views
Security risks have become more complex and common in today's digital world. Cybercriminals' strategies for exploiting vulnerabilities in networks, apps, and devices are constantly evolving. Enterprises must take strict security measures to mitigate these threats. Unified Threat Management is one such security technology (UTM). UTM is a comprehensive security solution that integrates multiple security technologies into a single platform to address a wide range of threats. This article explains the concept of UTM and its pros and cons. Brief introduction of Unified Threat Management ( UTM ) Unified Threat Management (UTM) is a comprehensive security system that integrates numerous security ... Read More