Internet Articles

Page 52 of 88

Why does Youtube use TCP not UDP?

Pranavnath
Pranavnath
Updated on 16-Mar-2026 4K+ Views

YouTube, the world's largest video streaming platform, uses TCP (Transmission Control Protocol) instead of UDP (User Datagram Protocol) for delivering video content to ensure reliable, high-quality streaming experiences for billions of users worldwide. While both protocols have their strengths, YouTube's choice of TCP is driven by specific requirements for video-on-demand services where data integrity and complete delivery take priority over minimal latency. TCP vs UDP for Video Streaming Feature TCP UDP Reliability Guaranteed delivery with error correction No delivery guarantee Connection Connection-oriented (3-way handshake) Connectionless Data ...

Read More

Vegas A (Modified TCP-Vegas)

Pranavnath
Pranavnath
Updated on 16-Mar-2026 358 Views

TCP Vegas A (Modified TCP-Vegas) is an adaptive congestion avoidance algorithm that detects network congestion based on Round Trip Time (RTT) measurements rather than packet loss. The "A" stands for "Adaptive, " emphasizing its ability to dynamically adjust to network conditions. Developed by Larry Peterson and Lawrence Brakmo in 1994, TCP Vegas focuses on preventing congestion proactively by monitoring packet delays. Unlike traditional TCP variants that react to packet loss, TCP Vegas maintains smaller congestion windows during transmission to achieve better throughput with fewer packet losses. It relies on accurate calculation of the Base RTT to distinguish between network ...

Read More

What is Tor Browser?

Pranavnath
Pranavnath
Updated on 16-Mar-2026 280 Views

In today's digital age, privacy and security have become major concerns for internet users. While the web has made life more convenient and efficient, it has also made our personal data vulnerable to cybercriminals, government surveillance, and other prying eyes. This is where the Tor Browser comes into play. Tor, short for "The Onion Router, " is a free and open-source web browser that allows users to browse the internet anonymously and securely. It directs internet traffic through a network of volunteer-operated servers worldwide, making it difficult for anyone to trace online activity back to the user's device. ...

Read More

Wifi protected access (WPA)

Pranavnath
Pranavnath
Updated on 16-Mar-2026 536 Views

WiFi Protected Access (WPA) is a security protocol designed to protect wireless networks from unauthorized access. Introduced in 2003, WPA was created to replace the vulnerable Wired Equivalent Privacy (WEP) standard, which had significant security flaws that made it easily exploitable by attackers. WPA provided a crucial stepping stone in wireless security, offering stronger encryption and improved authentication mechanisms while the more comprehensive IEEE 802.11i standard was being finalized. Background and Development In the early 2000s, researchers discovered critical vulnerabilities in WEP that allowed attackers to crack the encryption in under a minute using techniques like the ...

Read More

Advantages and Disadvantages of Static IP

Pranavnath
Pranavnath
Updated on 16-Mar-2026 3K+ Views

In computer networking, IP addresses serve as unique identifiers that enable devices to communicate within a network. When configuring network infrastructure, administrators must choose between static and dynamic IP addressing schemes. A static IP address is a fixed address manually assigned to a device that remains constant over time, unlike dynamic addresses that change automatically. Static IP addressing offers specific benefits for certain network scenarios, particularly for servers and enterprise environments. However, it also presents challenges in terms of management overhead and security considerations that organizations must carefully evaluate. Static vs Dynamic IP Address ...

Read More

Cisco Discovery Protocol(CDP) and Link Layer Dicovery Protocol(LLDP) in Data Link

Pranavnath
Pranavnath
Updated on 16-Mar-2026 855 Views

The Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are Layer 2 discovery protocols that enable network devices to share information about themselves with directly connected neighbors. These protocols are essential for network management, troubleshooting, and topology discovery. CDP is a proprietary Cisco protocol, while LLDP is an open IEEE 802.1AB standard that works across multiple vendors. Both protocols operate at the data link layer and help administrators understand network topology without requiring higher-layer protocols. How Discovery Protocols Work Discovery protocols send periodic advertisements containing device information to directly connected neighbors. These messages are transmitted ...

Read More

Advantages and Disadvantages of Hub

Pranavnath
Pranavnath
Updated on 16-Mar-2026 7K+ Views

A hub is a basic networking device used to connect multiple devices in a network. It operates at the physical layer of the OSI model and functions as a multiport repeater, receiving data from one device and broadcasting it to all connected ports. Hubs use fiber optic or twisted pair cables and work in half-duplex mode, meaning data can only flow in one direction at a time. Hub Network Topology HUB PC1 PC2 PC3 ...

Read More

Risk Associated with public Wi-Fi

Pranavnath
Pranavnath
Updated on 16-Mar-2026 279 Views

Public Wi-Fi networks provide convenient internet access in airports, restaurants, libraries, and other public spaces. However, these open networks pose significant security risks that users must understand to protect their devices and personal data from cyber attacks. While modern public Wi-Fi has implemented some security measures, it remains inherently less secure than private networks due to its shared nature and open access model. Public Wi-Fi Security Risks Your Device (Vulnerable) Public Wi-Fi (Unsecured) ...

Read More

Difference between Bridge and Repeater

Pranavnath
Pranavnath
Updated on 16-Mar-2026 3K+ Views

Bridges and repeaters are fundamental networking devices used to extend network range, but they operate at different layers and serve distinct purposes. A bridge connects multiple LANs to create a larger network while performing intelligent traffic filtering, whereas a repeater simply amplifies and regenerates signals to overcome distance limitations. Bridge vs Repeater Operation BRIDGE Data Link Layer (Layer 2) LAN A LAN B ...

Read More

Difference between CAT5e and CAT6

Pranavnath
Pranavnath
Updated on 16-Mar-2026 473 Views

Ethernet cables are the backbone of computer networking, connecting devices such as computers, printers, and switches to enable communication and data sharing. There are different types of Ethernet cables, known as categories, with each category offering a different level of performance. Two of the most commonly used categories are CAT5e and CAT6. While they both serve the same purpose, there are key differences between the two. In this article, we'll explore these differences and help users decide which cable is best suited for their needs. Whether you're setting up a small home network or managing a large enterprise system, ...

Read More
Showing 511–520 of 874 articles
« Prev 1 50 51 52 53 54 88 Next »
Advertisements