Computer Network Articles

Page 80 of 122

What is the difference between TDMA and CDMA?

Ginni
Ginni
Updated on 16-Mar-2026 784 Views

Let us understand the key differences between Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA), two fundamental multiple access techniques used in wireless communication systems. TDMA (Time Division Multiple Access) TDMA represents Time Division Multiple Access. It is a cellular mobile technology that depends on time-division multiplexing (TDM) techniques. In TDMA, each user is allocated the entire bandwidth of the medium for a specific time slot. After this time expires, control is transferred to the next user in a round-robin fashion. A simple example is television broadcasting where a 10-minute program is followed by ...

Read More

What is the difference between SNMP and Syslog?

Ginni
Ginni
Updated on 16-Mar-2026 467 Views

Simple Network Management Protocol (SNMP) and Syslog are two fundamental protocols used in network management and monitoring. While both help administrators manage networked devices, they serve different purposes and operate in distinct ways. SNMP SNMP (Simple Network Management Protocol) is an Internet-standard protocol for managing devices on IP networks. The devices that support SNMP include routers, switches, servers, workstations, printers, and modems. It operates as an application-level protocol using the TCP/IP protocol suite and follows a manager-agent architecture. A manager (typically a network management station) actively queries and controls multiple agents running on network devices. ...

Read More

What are the physical components of a Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 3K+ Views

Computer networks rely on several essential physical components that enable devices to communicate and share resources. These hardware components form the foundation of network infrastructure, from small home networks to large enterprise systems. Network Interface Card (NIC) A Network Interface Card (NIC) is a hardware component that connects a computer or device to a network. The NIC handles the physical connection to the network medium and manages data transmission between the device and the network. Every device that connects to a network requires a NIC, which can be integrated into the motherboard or installed as a separate ...

Read More

What is an Application Delivery Controller?

Ginni
Ginni
Updated on 16-Mar-2026 513 Views

An Application Delivery Controller (ADC) is a network device or software solution that manages and optimizes the flow of data between client connections and web or enterprise applications. ADCs serve as intelligent intermediaries that enhance application performance, security, and availability. ADCs are commonly deployed in application delivery networks (ADN) where they perform critical tasks to reduce the load on web servers and improve user experience. They are typically positioned between firewalls and application servers in a web farm within a demilitarized zone (DMZ). Application Delivery Controller Architecture Client ...

Read More

3-Layer of IOT architecture?

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

The Internet of Things (IoT) represents a network of physical objects or "things" that are embedded with sensors, software, electronics, and network connectivity. These components enable objects to collect and exchange data over the internet. The objective of IoT is to extend web connectivity from standard devices like computers and smartphones to everyday objects such as home appliances, vehicles, and industrial equipment. Components of IoT The IoT ecosystem consists of four fundamental components that work together to enable seamless data collection, processing, and user interaction: Sensors/Devices Sensors and devices are the foundation of any IoT system, ...

Read More

What is the MITM (Man in The Middle) Attack using ARP Poisoning?

Ginni
Ginni
Updated on 16-Mar-2026 633 Views

A Man-in-the-Middle (MITM) attack is a cyber attack where an attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other. This allows the attacker to eavesdrop on conversations, steal sensitive information, or manipulate the data being exchanged. In MITM attacks, the attacker positions themselves between the victim and their intended communication target, creating a scenario where all traffic flows through the attacker's system. This enables them to capture passwords, session tokens, personal data, and other sensitive information without the victims' knowledge. ARP Poisoning Attack ARP (Address Resolution Protocol) ...

Read More

What is the difference between IGRP and BGP?

Ginni
Ginni
Updated on 16-Mar-2026 478 Views

The Interior Gateway Routing Protocol (IGRP) and Border Gateway Protocol (BGP) are two distinct routing protocols that serve different purposes in network architecture. IGRP operates within autonomous systems, while BGP facilitates routing between different autonomous systems across the internet. IGRP (Interior Gateway Routing Protocol) IGRP is a distance-vector routing protocol developed by Cisco Systems in the 1980s for use within autonomous systems. It was designed to overcome the limitations of RIP by supporting larger networks and more sophisticated metrics. IGRP uses composite metrics including bandwidth, delay, reliability, and load to determine the best path to a destination. ...

Read More

What is Private Branch Exchange (PBX)?

Ginni
Ginni
Updated on 16-Mar-2026 869 Views

A Private Branch Exchange (PBX) is a private telephone network used within organizations to manage internal and external communications. Acting as a miniature telephone company central office, a PBX serves as the switching and routing hub for all voice communications within an enterprise. PBX systems enable organizations to create their own internal telephone network, allowing employees to communicate internally for collaboration and externally with customers, partners, and contacts through various channels such as VoIP (Voice over Internet Protocol) or ISDN (Integrated Services Digital Network). PBX System Architecture PBX ...

Read More

What is Lifi?

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

Li-Fi (Light Fidelity) is a wireless communication technology that uses visible light spectrum instead of radio waves for data transmission. The technology utilizes standard LED light bulbs equipped with special chips that modulate light intensity to transmit optical data signals, which are received by photoreceptors on client devices. A Li-Fi network transmits data by rapidly changing the intensity of LED light thousands of times per second − much faster than the human eye can detect. These intensity variations create digital signals that can carry internet data to devices like computers, tablets, and smartphones. The receiving device uses a photodetector ...

Read More

What is Touchless Touchscreen Technology?

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

A touchscreen is an essential input/output device layered on top of a computer display. Users provide input through single or multi-touch gestures by touching the screen, allowing direct interaction with displayed content without intermediate devices. Traditional touchscreens use resistive or capacitive technologies. Resistive systems include two electrically conductive layers separated by spacers. When the screen is touched, these layers connect, changing the electrical current flow, which the software interprets as coordinates and executes corresponding functions. Touchless touchscreen technology is a subset of gesture control technology that enables interaction between computers and users without physical contact. It relies on ...

Read More
Showing 791–800 of 1,219 articles
« Prev 1 78 79 80 81 82 122 Next »
Advertisements