Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Internet Articles
Page 2 of 88
What is hierarchical routing?
In hierarchical routing, the routers are divided into regions. Each router has complete details about how to route packets to destinations within its own region. But it does not have any idea about the internal structure of other regions.As we know, in both LS and DV algorithms, every router needs to save some information about other routers. When network size is growing, the number of routers in the network will increase. Therefore, the size of routing table increases, then routers cannot handle network traffic as efficiently. To overcome this problem we are using hierarchical routing.In hierarchical routing, routers are classified ...
Read MoreWhat are guided and unguided transmission media?
In transmission media is the way the systems are connected to route data signals in a network.The telecommunication links are classified into two categories −Guided media (wired)Unguided media (wireless).Both guided and unguided are used for short distance (LANs, MANs) as well as long distance (WANs) communication.Let us discuss Guided transmission media.Guided transmission mediaGuided transmission media consists of physical connection between source and destination through a wire or a cable.There are three basic types of guided media which are as follows −Twisted pair cableCo-axial cableFiber-optic cableTwisted Pair CopperStep 1 − It is the most used media across the world. All the ...
Read MoreClassful Vs Classless Addressing
Classful AddressThe first addressing system to be implemented as part of the Internet Protocol was Classful Addressing. In the year 1981, the Classful addressing network architecture was first used on the Internet. The Classful addressing system was superseded by a Classless addressing scheme with the introduction of Classless Inter-Domain Routing (CIDR) in 1993.The IP address comprises up of 32 bits and is split into four sections separated by dots: part 1, part 2, part 3, and part 4.The IP address is made up of four parts, each of which is eight bits long (1 byte).Further, the 4 parts of the ...
Read MoreDifference between Circuit Switching and Packet Switching
Circuit SwitchingCircuit Switching is a connection-oriented service. It provides a dedicated path from the sender to the receiver. In-circuit switching, a connection setup is required to send and receive data. It has very little chance of data loss and error due to the dedicated circuit, but a lot of bandwidth is wasted because the same path cannot be used by other senders during a congestion. Circuit switching is completely transparent; the sender and receiver can use any bit rate format or framing method.Advantages of Circuit SwitchingIt uses a fixed bandwidth.A dedicated communication channel increases the quality of communication.Data is transmitted ...
Read MoreNetwork Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
Network devices or networking hardware are the physical devices that are used for establishing connections and facilating interaction between different devices in a computer network. Hub Hubs work in the physical layer of the OSI model. A hub is a device for connecting multiple Ethernet devices and making them act as a single network segment. It has multiple inputs and output ports in which a signal introduced at the input of any port appears at the output of every port except the original incoming port. A hub can be used with both digital and analog data. Hubs do not perform ...
Read MoreWhat are noiseless and noisy channels?
Data link layer protocols are divided into two categories based on whether the transmission channel is noiseless or noisy. The data link layer protocol is diagrammatically represented below − Noiseless Channels There are two noiseless channels which are as follows − Simplex channel Stop & wait channel Let us consider an ideal channel where no frames are lost, duplicated, or corrupted. We introduce two protocols for this type of channel. These two protocols are as follows − Protocol that does not use flow control. Protocol that uses the ...
Read MoreHow To Modify MAC address in Windows 10 (Both Wired and Wireless Adapter)?
On Windows 10, take these steps to alter the MAC address of a wired adapter − Step 1: Go to the Device Manager Right-click on the Start button and select Device Management from the menu that displays to enter the Device Manager. Instead, press Windows key + X and choose Device Manager from the menu. Step 2: Locate the Network Adapter Expand the Network Adapters section in the Device Manager and locate the wired adapter that you want to modify. Right-click the adapter and select Properties from the menu that appears. Step 3: Modify the MAC Address In the Properties ...
Read MoreUnderstanding file sizes | Bytes, KB, MB, GB, TB, PB, EB, ZB, YB
Introduction In today's digital age, where information and data play a significant part, understanding file sizes is basic. Whether you're sharing photographs, downloading computer program, or overseeing your cloud storage, you experience file sizes in different units like bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB), petabytes (PB), exabytes (EB), zettabytes (ZB), and yottabytes (YB). These units are utilized to evaluate the sum of information in a file, and comprehending their noteworthiness can assist you make educated choices when managing with advanced substance. The Foundation: Bytes At the heart of the advanced domain lies the humble byte – a ...
Read MoreWhat is DNS Enumeration?
Introduction Within the world of technology, where communication and information trade happens at the speed of light, space names play an urgent part. They serve as human-readable addresses that permit us to get to websites, send emails, and connected with different online administrations. Behind the scenes, a basic handle known as DNS (Domain Name System) is capable of deciphering these space names into their comparing IP addresses. Be that as it may, this system's significance too makes it a potential target for malevolent exercises, one of which is DNS enumeration. What is DNS Enumeration? DNS enumeration is a method utilized ...
Read MoreHow to Access Dark Web Safely?
Introduction The internet underbelly, regularly alluded to as the "Dark Web, " has captured the interest of numerous, advertising a cryptic world covered up underneath the surface of the ordinary web. Exploring the Dark Web requires cautious thought because it could be a domain known for its unlawful exercises. In any case, for those who look for to get to it securely and dependably, understanding its flow, focal points, and pitfalls is vital. This article digs into the domain of the Dim Web, sketching out strategies for secure getting to, examining its merits and demerits, investigating its applications and challenges, and ...
Read More