Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 74 of 122
What is a Shielded Twisted Pair (STP) cable?
A Shielded Twisted Pair (STP) cable is a type of network cable that includes two independent wires wrapped in a protective foil or braided metal shielding. Originally developed by IBM for token ring networks, STP cables prevent electromagnetic interference and enable faster, more reliable data transmission. The key distinguishing feature of STP cables is their additional protective layer that surrounds the twisted wire pairs, providing superior electromagnetic interference (EMI) protection compared to unshielded twisted pair (UTP) cables. STP Cable Structure Outer Jacket ...
Read MoreWhat is AAA (Authentication, Authorization, and Accounting)?
Authentication, Authorization, and Accounting (AAA) is a comprehensive security framework that controls access to computer resources, enforces policies, and tracks user activities. This three-step process ensures that only authorized users can access network resources while maintaining detailed logs of their activities. AAA is commonly implemented with network protocols like RADIUS (Remote Authentication Dial-In User Service) and is typically deployed as a dedicated server to centrally manage network security policies across an organization. AAA Framework Process Flow Authentication Who are you? Authorization ...
Read MoreDynamic Domain Name System (DDNS) in Application Layer
The Dynamic Domain Name System (DDNS) is a protocol that provides DNS extensions allowing DNS servers to accept requests to dynamically add, update, and delete entries in the DNS database. Unlike traditional DNS, DDNS automatically updates DNS records when IP addresses change, making it essential for networks with dynamic IP addressing. Dynamic DNS was created to address the problem of frequent IP changes. When an ISP assigns dynamic IP addresses from a pool, the same domain may receive different IP addresses over time. DDNS automatically refreshes the DNS database to maintain accurate domain-to-IP mappings. How DDNS Works ...
Read MoreWhat is Digital Service Unit (DSU)?
A Digital Service Unit (DSU) is a hardware device that connects a Local Area Network (LAN) to an external digital communication carrier service. The DSU works in conjunction with a Channel Service Unit (CSU) to provide the interface between customer premises equipment and the telecommunications provider's digital network. The DSU serves as a critical component in WAN connectivity, converting digital signals between different formats and providing necessary timing and control functions for reliable data transmission over long distances. How DSU Works A DSU typically features multiple ports including a WAN port (connecting to the digital circuit) and ...
Read MoreWhat is Winternitz One Time Signature Scheme?
The Winternitz One-Time Signature (W-OTS) scheme is a quantum-resistant digital signature algorithm proposed by Robert Winternitz. It is considered post-quantum secure because it relies on the security of cryptographic hash functions rather than mathematical problems that quantum computers can solve efficiently. W-OTS uses a parameter W to determine the trade-off between signature size and computation time. The most common implementation uses W = 256, which provides a good balance between security and efficiency. Winternitz One-Time Signature Scheme Private Key 32 random values ...
Read MoreWhat is the difference between SSH and SFTP?
Let us begin by understanding the fundamental concepts and differences between SSH and SFTP. SSH (Secure Shell) SSH (Secure Shell) is a cryptographic network protocol that enables secure communication between two computers over an insecure network, including the internet. It provides encrypted remote login and command execution capabilities, replacing insecure protocols like Telnet, rlogin, and rsh. SSH was developed by SSH Communications Security Ltd to establish secure connections with remote devices. It supports strong authentication methods and encrypted data transmission using public-key cryptography, making it the standard for secure remote administration. SSH ...
Read MoreWhat is IrDA (Infrared Data Association)?
IrDA represents the Infrared Data Association, a universal consortium of hardware and software manufacturers that creates and supports interoperable solutions for infrared (IR) data networking for computer networks, connections, and different networking applications. Infrared communication uses a transceiver (a set of transmitters and receivers) in both devices that connect. Specialized microchips support this functionality, and several devices may require specific software for synchronized communication. An example is the special provision for IR in Microsoft's Windows 95 operating system. In the IrDA-1.1 standard, the maximum data frame size is 2048 bytes and the maximum transmission rate is 4 Mbps. ...
Read MoreWhat is Spatial Filtering (Beamforming) in Wireless Communications?
Spatial filtering, commonly known as beamforming, is a signal processing technique used in wireless communications to transmit or receive radio waves in a highly directional manner. This technology focuses energy in specific directions while minimizing interference, making it essential in modern wireless systems, radar, sonar, and acoustic applications. Beamforming works by controlling the phase and amplitude of signals at each antenna element in an antenna array. When multiple antennas transmit the same signal with carefully coordinated timing, they create constructive interference in desired directions and destructive interference in unwanted directions, forming a focused beam. ...
Read MoreWhat is GSM?
GSM (Global System for Mobile Communication) is a standard established by the European Telecommunication Standards Institute (ETSI) to define protocols for second-generation (2G) digital mobile networks. It replaced the first generation (1G) analog mobile networks and was based on concepts from mobile radio frameworks developed at Bell Laboratories in the early 1970s. GSM revolutionized mobile communications by introducing digital technology, enabling features like text messaging, better voice quality, and improved security compared to analog systems. GSM Frequency Bands GSM operates on three primary frequency bands: 900 MHz band − Originally used by the first ...
Read MoreWhat is Cluster Computing?
Cluster computing defines several computers linked on a network and implemented like an individual entity. Each computer that is linked to the network is known as a node. Cluster computing provides solutions to solve difficult problems by providing faster computational speed and enhanced data integrity. The connected computers implement operations all together thus generating the impression like a single system (virtual device). This procedure is defined as the transparency of the system. Cluster Computing Architecture Node 1 ...
Read More