Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 81 of 122
What are the types of Transfer Modes in HDLC?
HDLC (High-Level Data Link Control) is a bit-oriented protocol used for communication over point-to-point and multipoint connections. This protocol implements the structure of ARQ (Automatic Repeat Request) for reliable data transmission. The HDLC protocol is standardized by ISO and is designed for high-speed communication of large amounts of data. It was developed based on IBM's SDLC (Synchronous Data Link Control) protocol and can transmit data as bit strings of any required length. The basic unit of data communication in HDLC is called a frame. A transfer mode in HDLC defines the relationship between two devices in a network ...
Read MoreWhat is the difference between Google and Microsoft?
Google and Microsoft are two technology giants that dominate different aspects of the digital landscape. Understanding their core differences helps clarify their unique roles in modern computing and internet services. Google Google is primarily an internet services company founded in 1998, specializing in search engines, online advertising, and cloud-based applications. Its core business model revolves around data collection and targeted advertising. Google's main products include the Google Search engine, Gmail, Google Drive, YouTube, and the Android operating system. Google Chrome, launched in 2008, has become the world's most popular web browser, supporting multiple platforms including Windows, macOS, ...
Read MoreWhat is MQTT?
MQTT (Message Queuing Telemetry Transport) is a lightweight, publish-subscribe messaging protocol designed for communication in environments with limited bandwidth or unreliable network connections. Originally developed by IBM in the late 1990s to connect oil pipeline sensors with satellites, MQTT has become a cornerstone protocol for Internet of Things (IoT) and machine-to-machine (M2M) communication. The protocol operates on an asynchronous messaging model that decouples message senders and receivers in both space and time, making it highly scalable and suitable for unreliable network environments. MQTT Publish-Subscribe Architecture ...
Read MoreWhat is the difference between Firebase and Parse Server?
Firebase and Parse Server are both Backend-as-a-Service (BaaS) platforms that help developers build mobile and web applications without managing complex backend infrastructure. While they serve similar purposes, they have distinct differences in ownership, hosting, and features. Firebase Firebase is a comprehensive Backend-as-a-Service platform developed by Google. Built on Google's infrastructure, it provides developers with tools and services to create high-quality applications, scale user bases, and generate revenue. The analytics dashboard is Firebase's standout feature, offering clear insights into user behavior by tracking up to 500 event types with 25 attributes each. This dashboard helps developers understand how ...
Read MoreWhat is PTP?
Precision Time Protocol (PTP) is an Ethernet-based protocol defined by IEEE 1588 standard for synchronizing clocks across networked devices with sub-microsecond accuracy. It uses a Master/Slave hierarchical architecture to distribute precise timing information throughout a network. Unlike Network Time Protocol (NTP) which provides millisecond-level accuracy, PTP achieves microsecond-level precision, making it ideal for applications requiring extremely tight time synchronization such as industrial automation, telecommunications, and high-frequency trading systems. PTP Master/Slave Clock Hierarchy Grandmaster Boundary Clock ...
Read MoreWhat is Media Gateway Control Protocol (MGCP)?
Media Gateway Control Protocol (MGCP) is a master/slave protocol used in Voice over IP (VoIP) systems to control media gateways. MGCP enables call agents to manage, create, modify, and delete connections on media gateways, which serve as endpoints for multimedia sessions. In MGCP architecture, the call control intelligence resides outside the gateways in external call control elements called Call Agents. This separation allows centralized control while the gateways handle media processing functions. How MGCP Works MGCP operates on a decomposed gateway model where call control and media processing are separated. The Call Agent sends commands to media ...
Read MoreWhat is the difference between VPS and VDS?
Let us begin by understanding what VPS is and how it differs from VDS. VPS (Virtual Private Server) VPS stands for Virtual Private Server. It is a virtualized server environment created by partitioning a single physical server into multiple isolated virtual instances. Each VPS operates as an independent server with its own dedicated resources, operating system, and administrative access. A VPS provides users with root access and the ability to install custom software, configure server settings, and manage applications independently. This virtualization technology allows multiple VPS instances to run simultaneously on one physical machine while maintaining complete ...
Read MoreWhat is (SPF) Sender Policy Framework?
Sender Policy Framework (SPF) is an email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain. It helps recipients verify that incoming emails are legitimate and not part of spam or phishing attacks. SPF works by publishing a list of authorized IP addresses in the domain's DNS records. When an email is received, the recipient's mail server checks whether the sending server's IP address is included in the domain's SPF record. If the IP address is not authorized, the email may be rejected or marked as suspicious. ...
Read MoreWhat are Remote Access Trojans?
A Remote Access Trojan (RAT) is a type of malware that provides attackers with complete remote control over an infected computer system. Once installed, a RAT enables cybercriminals to access local files, steal login credentials, monitor user activity, and use the compromised system as a gateway to spread additional malware. RATs are also known as creepware due to their surveillance capabilities. They typically infiltrate systems disguised as legitimate software downloads, email attachments, or bundled with games and applications that users willingly install. How Remote Access Trojans Work When a RAT infects a computer, it establishes a covert ...
Read MoreWhat is the Trojan horse in Information Security?
A Trojan horse is a type of malware that infiltrates computers by disguising itself as legitimate software. Named after the famous wooden horse from Greek mythology, this malicious program deceives users into voluntarily installing it on their systems. Unlike viruses or worms, Trojans do not self-replicate and require user interaction to spread. The primary objective of a Trojan is to remain hidden while providing unauthorized access to the infected system. Once installed, it creates a backdoor that allows cybercriminals to remotely control the compromised device, steal sensitive information, or use it as a launching pad for further attacks. ...
Read More