Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 96 of 122
Deep Web: The Dark Side of Internet
The deep web refers to all parts of the internet that are not indexed by standard search engines like Google, Bing, or Yahoo. This includes password-protected sites, private databases, email inboxes, and internal company pages. The dark web is a small subset of the deep web that requires special software like Tor to access and is intentionally hidden from conventional browsers. While often confused, these terms represent different concepts. The deep web is largely legitimate content that simply isn't publicly searchable, whereas the dark web specifically refers to encrypted networks designed for anonymity. Layers ...
Read MoreWPAN Technologies for IoT/M2M
Internet of Things (IoT) devices connect to real-world entities to send and receive data over the internet. Here "Things" refers to any physical entities like smartwatches, health monitoring devices, home appliances, and traffic systems. These devices analyze information from their surroundings and make decisions with minimal human interaction, transmitting results through connected networks to receiver devices such as laptops, tablets, or smartphones. Machine to Machine (M2M) communication enables two or more devices to share functions and data within the same network. These devices can exchange, analyze, and transmit data without human intervention, operating with or without internet connectivity. M2M ...
Read MoreZ-Wave Protocol
Z-Wave Protocol is a wireless communication protocol specifically designed for smart home devices. It was introduced in 2004 by Danish company Zensys, which was later acquired by Sigma Designs in 2009. Z-Wave operates as a low-power, low-bandwidth protocol in the sub-gigahertz range. This allows it to achieve longer range and better penetration through walls and floors compared to conventional Wi-Fi or Bluetooth technologies. The protocol uses a mesh network topology, where devices communicate with each other directly or through intermediate nodes. Each device in the network acts as a repeater, ensuring that signals can reach devices that are ...
Read MoreWhy does Youtube use TCP not UDP?
YouTube, the world's largest video streaming platform, uses TCP (Transmission Control Protocol) instead of UDP (User Datagram Protocol) for delivering video content to ensure reliable, high-quality streaming experiences for billions of users worldwide. While both protocols have their strengths, YouTube's choice of TCP is driven by specific requirements for video-on-demand services where data integrity and complete delivery take priority over minimal latency. TCP vs UDP for Video Streaming Feature TCP UDP Reliability Guaranteed delivery with error correction No delivery guarantee Connection Connection-oriented (3-way handshake) Connectionless Data ...
Read MoreWhy HTTP is not secure?
HTTP stands for Hypertext Transfer Protocol. It is a set of rules that defines how data is transmitted between web browsers and servers on the World Wide Web. HTTP is an application layer protocol used for transferring hypermedia documents such as HTML pages, allowing users to communicate and access information online. The fundamental issue with HTTP is that it transmits data in plain text format without any encryption. This means that any data sent between your browser and a web server − including usernames, passwords, personal information, and browsing activity − can be easily intercepted and read by malicious ...
Read MoreTransparency of RPC in Distributed Networks
In distributed networks, communication between different nodes is essential for achieving desired functionality. Remote Procedure Call (RPC) enables this communication by allowing programs to execute procedures on remote servers as if they were local. However, the success of distributed networks often depends on RPC transparency. RPC can be defined as a function call used by one program to request services from another program, where these programs may be located on different systems across the network. RPC Transparency in Distributed Networks Client Node Application Program A ...
Read MoreType-C Port in Computer Network
The Type-C Port (also known as USB-C) is a universal connector standard that combines power delivery and high-speed data transfer capabilities. Unlike previous USB standards, USB-C features a reversible design and can deliver up to 100 watts of power, making it suitable for charging everything from smartphones to laptops. USB-C has emerged as the industry standard, gradually replacing older connectors like USB-A, USB-B, and even specialized ports like Thunderbolt and DisplayPort. Its versatility lies in supporting multiple protocols through a single, compact connector. USB-C Port Evolution ...
Read MoreTypes Of Spanning Tree Protocol (STP)
The Spanning Tree Protocol (STP) is a Layer 2 network protocol designed to prevent loops in Ethernet networks by creating a loop-free logical topology. When multiple physical paths exist between network switches, STP blocks redundant links to prevent broadcast storms and ensures only one active path between any two network devices. STP operates by electing a Root Bridge and calculating the best path to reach it from every switch in the network. All other paths are blocked but remain as backup links that can be activated if the primary path fails. STP Loop Prevention ...
Read MoreTypes of VoIP hacking and counter measures
Voice over Internet Protocol (VoIP) is a collection of technologies that enables the delivery of voice communication, video, audio, and images over data networks using internet protocol. This technology allows users to make voice calls using internet connections, offering greater flexibility and cost-effectiveness compared to traditional telephone systems. However, VoIP systems are vulnerable to various security threats that can compromise communication integrity and steal sensitive information. VoIP Communication Flow User A VoIP Phone Internet VoIP Network ...
Read MoreUnknown Facts Of Networking
Networking is the procedure to connect various devices and systems, allowing communication and exchange of information. It has become a necessary aspect of our day-to-day lives, with the internet and other networked technologies enabling us to work, learn, and socialize on a global scale. Despite its ubiquitous presence, there are many unknown facts about networking that even tech-savvy individuals might not be aware of. In this article, we will explore some of these lesser-known facts and shed light on the fascinating world of networking. Unknown Facts of Networking The First Computer Network Was Created in the 1960s ...
Read More