Internet Articles

Page 33 of 88

Use of Callbacks in Layered Architecture

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 528 Views

A layered architecture organizes software systems into distinct layers, where each layer handles specific functionality and communicates with adjacent layers through well-defined interfaces. This design pattern is fundamental in networking protocols, operating systems, and enterprise applications. Most enterprise applications follow a three-layer architecture consisting of the Presentation layer (user interface), Business layer (application logic), and Persistence layer (data storage). Each layer depends only on the layer below it, creating a clean separation of concerns. What is a Callback? A callback is executable code passed as an argument to other code, with the expectation that it will be ...

Read More

Advantages and Disadvantages of Subnetting

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 6K+ Views

Subnetting is a process of dividing a single physical network into several logical subnetworks (subnets) by borrowing bits from the host portion of an IP address to create multiple smaller networks within a larger network. Subnetting enables organizations to expand their network infrastructure without acquiring additional network numbers from their Internet Service Provider (ISP). It reduces network traffic, improves security, and allows for better network management by creating logical boundaries within the network. Network Subnetting Example Original Network: 192.168.1.0/24 (256 hosts) ...

Read More

Difference between Cache and Cookies in Computer Network

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 962 Views

A cache is a data storage mechanism that allows users to retrieve data or files on computers quickly, while cookies are small text files that web browsers save on users' computers to store preferences and session information. Both cache and cookies are essential components of web browsing that enhance user experience, but they serve different purposes and operate in distinct ways. What is Cache? A cache is a temporary storage layer that stores frequently accessed data to reduce retrieval time and improve performance. Hardware and Software Implementation − Caches exist in both hardware (CPU ...

Read More

Difference between DropBox and BorgBase

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 211 Views

Dropbox and BorgBase are two distinct cloud storage solutions that serve different purposes and target different user bases. Dropbox focuses on file synchronization and sharing across devices, while BorgBase specializes in secure backup storage using the Borg backup system. Dropbox Dropbox is a cloud storage and file synchronization service provided by Dropbox, Inc., an American corporation headquartered in San Francisco, California. Founded in 2007 by Drew Houston and Arash Ferdowsi as MIT students, Dropbox works across all major platforms including Windows, Mac OS, iOS, Android, and web browsers. Dropbox is credited with popularizing the cloud storage concept ...

Read More

What is Advanced Peer-to-Peer Networking (APPN)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 632 Views

A Peer-to-Peer (P2P) network is a distributed computing model where tasks and workloads are shared among interconnected nodes called peers. Unlike traditional client-server architectures, all participants have equal capabilities and responsibilities for data processing and sharing. Advanced Peer-to-Peer Networking (APPN) is a sophisticated networking protocol developed by IBM as part of their Systems Network Architecture (SNA). APPN enables computers to communicate directly with each other without relying on a central server or controlling hardware, providing enhanced flexibility and fault tolerance. APPN Network Architecture Node A ...

Read More

Difference between RIP and OSPF

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 6K+ Views

The Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are two fundamental routing protocols used in computer networks, but they operate on entirely different principles and are suited for different network environments. Routing Information Protocol (RIP) RIP is one of the oldest distance-vector routing protocols that uses hop count as its primary routing metric. It determines the best path to a destination based solely on the number of routers (hops) a packet must traverse. Maximum hop limit − RIP permits a maximum of 15 hops, which limits the size of networks that can ...

Read More

What is Multiple Spanning Tree Protocol (MSTP)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 2K+ Views

Multiple Spanning Tree Protocol (MSTP) is an advanced Ethernet switching protocol that enables efficient loop prevention across multiple Virtual LANs (VLANs) simultaneously. Unlike traditional STP which creates one spanning tree for all VLANs, MSTP allows different VLANs to use separate spanning tree instances for optimal path utilization. MSTP uses Bridge Protocol Data Units (BPDUs) to communicate tree topology information between switches. It prevents loops by creating a loop-free topology while allowing different VLANs to take different paths through the network, maximizing link utilization and providing load balancing capabilities. MSTP - Multiple Spanning Trees ...

Read More

What is a Shielded Twisted Pair (STP) cable?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 5K+ Views

A Shielded Twisted Pair (STP) cable is a type of network cable that includes two independent wires wrapped in a protective foil or braided metal shielding. Originally developed by IBM for token ring networks, STP cables prevent electromagnetic interference and enable faster, more reliable data transmission. The key distinguishing feature of STP cables is their additional protective layer that surrounds the twisted wire pairs, providing superior electromagnetic interference (EMI) protection compared to unshielded twisted pair (UTP) cables. STP Cable Structure Outer Jacket ...

Read More

What is AAA (Authentication, Authorization, and Accounting)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 3K+ Views

Authentication, Authorization, and Accounting (AAA) is a comprehensive security framework that controls access to computer resources, enforces policies, and tracks user activities. This three-step process ensures that only authorized users can access network resources while maintaining detailed logs of their activities. AAA is commonly implemented with network protocols like RADIUS (Remote Authentication Dial-In User Service) and is typically deployed as a dedicated server to centrally manage network security policies across an organization. AAA Framework Process Flow Authentication Who are you? Authorization ...

Read More

Dynamic Domain Name System (DDNS) in Application Layer

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 5K+ Views

The Dynamic Domain Name System (DDNS) is a protocol that provides DNS extensions allowing DNS servers to accept requests to dynamically add, update, and delete entries in the DNS database. Unlike traditional DNS, DDNS automatically updates DNS records when IP addresses change, making it essential for networks with dynamic IP addressing. Dynamic DNS was created to address the problem of frequent IP changes. When an ISP assigns dynamic IP addresses from a pool, the same domain may receive different IP addresses over time. DDNS automatically refreshes the DNS database to maintain accurate domain-to-IP mappings. How DDNS Works ...

Read More
Showing 321–330 of 874 articles
« Prev 1 31 32 33 34 35 88 Next »
Advertisements