Computer Network Articles

Page 94 of 122

The PACELC theorem

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 589 Views

The PACELC theorem is an extension of the famous CAP theorem that provides a more comprehensive framework for understanding trade-offs in distributed systems. While CAP focuses on Consistency, Availability, and Partition tolerance, PACELC adds considerations for Latency and Consistency during normal operations. The theorem states: if there is a network partition (P), a system must choose between availability (A) and consistency (C); else (E), when the system is running normally without partitions, there is a trade-off between latency (L) and consistency (C). Understanding PACELC Components Partition Tolerance (P) Partition tolerance ensures the system continues functioning even when ...

Read More

Difference between WAP and the Internet

Md. Sajid
Md. Sajid
Updated on 16-Mar-2026 3K+ Views

The Internet and WAP (Wireless Application Protocol) are both technologies that enable access to information and services, but they serve different purposes and operate in distinct ways. WAP was specifically designed for mobile devices like cell phones and PDAs to access internet content in a format optimized for small screens and limited processing power. While the Internet uses HTML for web pages, WAP employs Wireless Markup Language (WML) to deliver content that is lightweight and suitable for mobile devices with constrained capabilities. WAP vs Internet Architecture WAP ...

Read More

Top 10 Common Security Log Sources

Pranavnath
Pranavnath
Updated on 16-Mar-2026 1K+ Views

In this article, we will explore the top 10 common security log sources that organizations use to monitor and protect their IT infrastructure. Security log sources are data generators that create event logs containing records of system activities, user actions, and security events. These logs serve as crucial evidence when security incidents occur, helping security specialists identify threats, analyze attack patterns, and respond to breaches effectively. Event logs contain software and hardware-related information that enables security teams to detect bugs, risks, and threats within their systems. Every organization should implement comprehensive log analysis based on regulatory requirements and established ...

Read More

Trojan horse and Trap Door

Pranavnath
Pranavnath
Updated on 16-Mar-2026 4K+ Views

A program threat is malicious software designed to compromise system security, steal data, or gain unauthorized access. Two of the most significant program threats are Trojan horses and trap doors (backdoors), which can cause data corruption, information theft, and system compromise. These threats exploit vulnerabilities in systems to perform unauthorized activities, making it crucial for organizations and individuals to understand their mechanisms and implement proper security measures. Security Violations Program threats can lead to several types of security violations: Data theft − Stealing sensitive information like credit card numbers, passwords, and financial data Unauthorized modification ...

Read More

Trusted Systems in Network Security

Pranavnath
Pranavnath
Updated on 16-Mar-2026 5K+ Views

A Trusted System is a computer system that provides users with assurance that no malicious or harmful software can compromise system security. In network security, trusted systems implement multi-layered security (MLS) approaches to protect data and infrastructure from cyberattacks, malware, and unauthorized access. With organizations increasingly adopting cloud storage, wireless networks, and remote applications, the challenges of protecting network resources have grown significantly. Trusted systems address these challenges by enforcing strict security policies that cannot be altered by applications or unauthorized users. Network Security and Multilayered Defense Network Security encompasses the protection of data, network infrastructure, and ...

Read More

Traditional TCP

Pranavnath
Pranavnath
Updated on 16-Mar-2026 7K+ Views

Traditional TCP (Transmission Control Protocol) is a connection-oriented, reliable transport layer protocol that ensures data delivery between communicating devices over wired networks. Operating at Layer 4 of the OSI model, TCP provides complete transport services by breaking data into segments, managing their transmission, and reassembling them at the destination. TCP was originally designed by Vint Cerf and Bob Kahn for reliable communication over stable wired networks. It works in conjunction with the Internet Protocol (IP) to form the TCP/IP protocol suite, which serves as the foundation of modern internet communication. Traditional TCP Data Flow ...

Read More

Understanding Web Authentication behind the login screen

Pranavnath
Pranavnath
Updated on 16-Mar-2026 799 Views

Web Authentication is the process of verifying user credentials when accessing online accounts like e-commerce websites, social media platforms, or online banking services. Each user account is assigned a unique identifier and password, which are securely stored on web servers for future verification. Modern authentication also supports biometric methods like fingerprint scanning, facial recognition, and voice authentication. Consider Gmail as an example − during login, users must enter their username/email and password. Only when this combination matches the mail server database records will access be granted to the account and its services. Web Authentication ...

Read More

Types of Network Protocols and Their Uses

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

Network protocols are standardized sets of rules that govern how devices communicate and exchange data across networks. These protocols enable seamless communication between different devices, regardless of their hardware, operating system, or network architecture, making modern digital communication possible across local networks and the Internet. Network protocols serve three primary functions: enabling network communication, managing network operations, and ensuring network security. Each protocol is designed to address specific networking requirements and operates at different layers of the OSI model. Types of Network Protocols Network protocols are categorized into three main types based on their primary functions: ...

Read More

Video Conferencing Protocols

Pranavnath
Pranavnath
Updated on 16-Mar-2026 3K+ Views

Video conferencing protocols are standardized communication rules that enable real-time audio and video communication over networks. These protocols define how multimedia data is transmitted, synchronized, and managed between participants in video conferences across different devices and network types. Video conferencing systems rely on these protocols to establish connections, negotiate capabilities, compress media streams, and ensure quality communication. Understanding these protocols is essential for network administrators and developers working with multimedia communication systems. Network Types for Video Conferencing Video conferencing operates over two fundamental network architectures: Circuit-Switched Networks − Establish a dedicated communication path between ...

Read More

Types of Joints in Optical Fiber

Pranavnath
Pranavnath
Updated on 16-Mar-2026 4K+ Views

Optical fiber is a technology through which data passes in the form of light at high speed. It is a thin transparent cable that is flexible and can be bent easily. Fiber optic cables can be joined multiple times in one installation using specialized joints. Joints are used to transfer light from one fiber optic cable to another and are made up of plastic or glass materials. In this article, we will explore the various types of joints in optical fiber. Fiber Optic Joint Connection ...

Read More
Showing 931–940 of 1,219 articles
« Prev 1 92 93 94 95 96 122 Next »
Advertisements