Internet Articles

Page 50 of 88

Cable TV for Data Transfer

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

Cable television (TV) networks have evolved beyond their original purpose of transmitting television signals to become a robust infrastructure for high-speed data transfer. Cable TV networks now serve as the backbone for internet access, telephony, and various digital services through cable modem technology, which enables data transmission over the same coaxial cables used for television broadcasting. Cable modem internet service offers significant advantages over traditional telephone line connections, providing faster speeds and greater capacity. This makes cable-based internet a popular choice for residential and business users seeking reliable broadband connectivity. What is Cable TV? Cable television is ...

Read More

How to hide an IP address

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 839 Views

An IP address is like a digital fingerprint, revealing your location and identity online. Just as you can use a disguise to hide your physical identity, you can also conceal your IP address to protect your privacy and security. Here are several effective methods to hide your IP address: Methods to Hide Your IP Address Virtual Private Network (VPN) A VPN creates a secure, encrypted tunnel for all your online activity and assigns you a new IP address from a different location. This makes it appear as though you are browsing from somewhere else entirely. ...

Read More

2-tier and 3-tier Architecture in Networking

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 4K+ Views

Architecture in networking refers to the way a network is designed and organized, serving as the blueprint for the interaction and cooperation between different components and systems. Effective network architecture is crucial for successful network setup and requires careful planning and design. When classifying network architecture, a common division is single-tier, two-tier, or three-tier. In a two-tier architecture, the network is separated into a client tier where the end-user interacts with the system, and a server tier where applications, data, and processing power reside. This clear separation of responsibilities makes the network easier to manage, secure, and scale. ...

Read More

Digital Audio Broadcasting (DAB)

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 7K+ Views

Radio broadcasting has evolved significantly from its analog origins to embrace digital technology. Digital Audio Broadcasting (DAB) represents a major advancement in radio transmission, offering superior audio quality and enhanced features compared to traditional analog radio systems. DAB is a digital radio broadcasting standard that uses digital audio compression to transmit multiple audio streams efficiently over the airwaves. Unlike analog radio, DAB provides CD-quality sound along with additional data services such as program information, track listings, and text displays. How DAB Works DAB operates by converting analog audio signals into compressed digital data using MPEG-1 Audio Layer ...

Read More

Network Hubs

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

A network hub is a basic networking device that serves as a central connection point for multiple devices in a Local Area Network (LAN). Hubs operate at the physical layer (Layer 1) of the OSI model and use a simple broadcast mechanism to enable communication between connected devices such as computers, printers, and servers. While hubs were widely used in early network implementations, they have largely been replaced by switches due to their inherent limitations. However, understanding hubs remains important for grasping fundamental networking concepts. How Network Hubs Work A network hub operates using a broadcast mechanism. ...

Read More

Fibre Channel Protocol

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

Fibre Channel Protocol (FCP) is a high-performance communication protocol designed to provide fast and reliable data transfers between servers and storage devices in Storage Area Networks (SANs). FCP operates by encapsulating SCSI commands within Fibre Channel frames, enabling efficient block-level data access over dedicated storage networks. How FCP Works FCP operates as a layered protocol at the transport and session layers of the OSI model. It works by encapsulating SCSI commands and data within Fibre Channel frames, which are then transmitted over a Fibre Channel network. FCP Data Flow Process ...

Read More

How to Read a Traceroute?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 2K+ Views

Traceroute is a network diagnostic tool that maps the path data packets take from your computer to a destination server, helping identify bottlenecks and network issues along the route. When you run a traceroute, it sends packets with incrementally increasing Time-To-Live (TTL) values. Each router decrements the TTL, and when it reaches zero, the router returns an "ICMP time exceeded" message. This process repeats until packets reach the destination, revealing every router in the path. Traceroute Path Discovery Source ...

Read More

How to Set Up a VoIP Phone at Home?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 2K+ Views

If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative to traditional landline services. VoIP (Voice over Internet Protocol) is a technology that enables phone conversations to be made over the internet rather than traditional phone lines. Not only is VoIP cheaper than conventional phone services, but it also delivers superior call quality and a range of innovative features like video calling, call recording, and advanced call routing. VoIP Phone Setup Overview VoIP Phone or ATA ...

Read More

How to set up and use a proxy server?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 814 Views

In today's digital landscape, internet privacy and security have become paramount concerns. A proxy server serves as an intermediary between your device and the internet, providing enhanced security, privacy, and access to restricted content. When you make a web request, it first goes through the proxy server, which then forwards it to the destination website. The response follows the same path back to your device. This process masks your real IP address and provides several security and functional benefits. How Proxy Server Works ...

Read More

Poison Reverse vs Split Horizon

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 3K+ Views

Routing protocols determine optimal paths for data transmission through networks by maintaining and updating routing tables. Two important loop-prevention techniques used in distance-vector routing protocols like RIP and EIGRP are Poison Reverse and Split Horizon. Both techniques address the counting-to-infinity problem that occurs when routers continuously exchange routing information, potentially creating loops that cause packets to circulate indefinitely. Split Horizon Split Horizon is a simple rule that prevents a router from advertising a route back through the same interface from which it learned that route. This technique stops routing information from bouncing between routers. ...

Read More
Showing 491–500 of 874 articles
« Prev 1 48 49 50 51 52 88 Next »
Advertisements