Computer Network Articles

Page 95 of 122

Understanding Internet of Robotic Things

Pranavnath
Pranavnath
Updated on 16-Mar-2026 407 Views

The Internet of Things (IoT) enables connecting smart devices to the network where these devices can communicate with each other without human intervention. This technology allows users to transmit huge amounts of data through wireless media. When IoT is combined with robotics, it creates a more advanced paradigm called the Internet of Robotic Things (IoRT), which adds intelligence, autonomous decision-making, and physical interaction capabilities to connected devices. IoT vs Internet of Robotic Things Traditional IoT • Data Collection • Remote Monitoring ...

Read More

Types of Bridge Protocol Data Unit (BPDUs)

Pranavnath
Pranavnath
Updated on 16-Mar-2026 936 Views

In this article, we will understand the types of Bridge Protocol Data Unit (BPDU). BPDU is the messaging mechanism used by switches in the Spanning Tree Protocol (STP) domain to exchange critical network topology information. The Spanning Tree Algorithm uses BPDU transmission to discover and understand the network topology, preventing loops and ensuring optimal path selection. When devices are connected to switch ports, data transmission doesn't begin immediately. Instead, ports transition through various STP states, and BPDUs are used during this process to determine network topology and enable switches to gather information about each other. ...

Read More

Unicodes in computer network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 1K+ Views

Unicode is a universal character encoding standard that provides a consistent way to represent and handle text from all the world's writing systems. Developed by the Unicode Consortium in 1991, Unicode solves the limitations of ASCII by supporting millions of characters including letters, symbols, mathematical notations, and emojis from different languages and scripts. While ASCII can only represent 128-256 characters (sufficient only for English), Unicode can encode over 1.1 million characters, making it essential for modern global communications and computer networks. Unicode Character Encoding Coverage ASCII ...

Read More

Understanding Tethering Network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 741 Views

Tethering is a network feature that enables a mobile device to share its internet connection with other devices such as laptops, tablets, or computers. This technology transforms your smartphone into a mobile router or modem, providing internet access in environments where traditional Wi-Fi or wired connections are unavailable. The primary advantage of tethering is its versatility − it allows users to establish internet connectivity anywhere with cellular coverage, making it an essential tool for remote work, travel, and emergency situations. Tethering Network Architecture ...

Read More

Universal Plug and Play (UPnP)

Pranavnath
Pranavnath
Updated on 16-Mar-2026 697 Views

Universal Plug and Play (UPnP) is a networking protocol that enables automatic device discovery and connectivity within local area networks. It uses standard protocols like TCP/IP, DHCP, and HTTP to establish connections and acquire IP addresses for wirelessly connected devices. UPnP simplifies device interactions by allowing automatic configuration without manual setup. Common examples include streaming video from laptops to smart TVs, connecting printers to multiple devices, and enabling home automation through IoT devices. UPnP Device Discovery and Connection Laptop 192.168.1.100 ...

Read More

Wide-Mouth Frog

Pranavnath
Pranavnath
Updated on 16-Mar-2026 528 Views

The Wide-Mouth Frog protocol is a simple authentication protocol used in distributed systems to establish secure communication between entities through a trusted third party. Named metaphorically after the frog's ability to "open wide" and relay information, this protocol enables secure key distribution and mutual authentication in network environments. The protocol operates with three entities: two parties wanting to communicate securely (typically Alice and Bob) and a trusted Key Distribution Center (KDC). The Wide-Mouth Frog protocol is particularly useful in scenarios where direct key exchange between parties is not feasible or secure. How Wide-Mouth Frog Protocol Works The ...

Read More

What is QUAD9 Technology

Pranavnath
Pranavnath
Updated on 16-Mar-2026 523 Views

Quad9 is a free public DNS resolver that protects users from malware, spyware, botnets, and other security threats. Operated by the Swiss-based non-profit Quad9 Foundation, it provides enhanced security and privacy by blocking access to malicious websites while maintaining GDPR compliance through strict data protection policies. Unlike traditional DNS services that may collect and monetize user data, Quad9 does not store or log users' IP addresses. It blocks malicious domains using real-time threat intelligence from cybersecurity experts and companies, preventing devices from connecting to known dangerous websites. How Quad9 Works Quad9 operates as a recursive DNS resolver, ...

Read More

Data Security in Computer Network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

Data security is the practice of protecting digital information from unauthorized access, theft, corruption, or destruction throughout its entire lifecycle. It encompasses the implementation of policies, procedures, and technical controls to safeguard sensitive data in computer networks and systems. Data security is built upon the CIA Triad − three fundamental principles that guide security implementations: Confidentiality ensures only authorized users can access data, Integrity maintains data accuracy and prevents unauthorized modifications, and Availability guarantees legitimate users can access data when needed. CIA Triad in Data Security ...

Read More

Data Communication-Definition, components, Types, Channels?

Pranavnath
Pranavnath
Updated on 16-Mar-2026 12K+ Views

Data communication is the process of transferring digital information between two or more devices or nodes in a computer network. It enables devices to exchange data, share resources, and coordinate activities regardless of their physical location. Modern data communication systems have revolutionized how we interact, enabling instant messaging, video calls, file sharing, and remote collaboration across vast distances through both wired and wireless technologies. Components of Data Communication A data communication system consists of five essential components that work together to ensure successful transmission: Message − The information or data to be transmitted, which ...

Read More

Details of DNS

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

The Domain Name System (DNS) is a fundamental component of the internet that enables users to access websites and online resources using human-readable domain names instead of numerical IP addresses. DNS acts as the internet's phone book, translating domain names like google.com into machine-readable IP addresses like 192.168.1.1. This translation system is essential because it allows users to navigate the web using memorable domain names rather than having to memorize complex strings of numbers. Without DNS, accessing websites would require users to remember IP addresses for every site they want to visit, making the internet far less user-friendly. ...

Read More
Showing 941–950 of 1,219 articles
« Prev 1 93 94 95 96 97 122 Next »
Advertisements