
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1045 Articles for Internet

7K+ Views
Network Management involves monitoring and controlling a network system so that it can operate properly without downtime. So, the function performed by a network management system are categorised as follows −Fault managementFault management is the procedure of technology used to manage the administrator who prevents faults within a networked system so that the availability of downtime is reduced by identifying, isolating and fixing any malfunctions that occur. It can support active and passive components to disavow fault.Configuration managementIt refers to the process of initially configuring a network and then adjusting it in response to changing networks requirements. This function is ... Read More

13K+ Views
Network management is the procedure of administering, managing and working a data network using a network management system. Current network management systems use software and hardware to constantly collect and analyse data and push out configuration changes for increasing performance, reliability, and security.It involves configuring monitoring and possibly reconfiguring components in a network with the goal of providing optimal performance, minimum downtime, proper security, accountability and flexibility.FeaturesThere are various features of network management which are as follows −Network automationOne defining feature of a modern network management system is network automation. This is the procedure of automating the configuring, handling, testing, ... Read More

3K+ Views
POP stands for Post Office Protocol. It provides a standard mechanism for retrieving emails from a remote server for a mail recipient. For instance, suppose that a home user A usually connects to the Internet using a dial-up connection to an ISP.Suppose that another person, B, has sent an e-mail to A, when A is a net connected to the Internet. The email gets stored in the mailbox for user A provided by the ISP.When A connects to the Internet the next time and wants to see the new e-mail that has arrived, he opens his email client program. That ... Read More

5K+ Views
MIME represents Multi-Purpose Internet Mail Extensions. It is a development to the Internet email protocol that enables its users to exchange several kinds of data files over the Internet, including images, audio, and video.The MIME is required if the text in character sets other than the American Standard Code for Information Interchange (ASCII). Virtually, all human-written Internet email and a fairly large proportion of automated email is transmitted via Simple Mail Transfer Protocol (SMTP) in MIME format.MIME was designed mainly for SMTP, but the content types defined by MIME standards are important also in communication protocols outside of email, such ... Read More

8K+ Views
ATM transfers data in fixed-size units are known as cells. Each cell includes 53 octets or bytes, as shown in the figure. The first 5 bytes contain cell-header data, and the remaining 48 include the payload (user information).Small, fixed-length cells are well appropriated to transfer voice and video traffic due to such traffic is biased to delays that result from having to wait for a huge data packet to download, among other things.HeaderPayload5 Bytes48 BytesATM Cell FormatAn ATM cell header can be two formats, such as User Network Interface (UNI) or Network to Network Interface (NNI). The UNI header can ... Read More

23K+ Views
Following are some of the services offered by the Transmission Control Protocol (TCP) to the processes at the application layer:Stream Delivery Service.Sending and Receiving Buffers.Bytes and Segments.Full Duplex ServiceConnection Oriented Service.Reliable Service.All the above mentioned TCP services are explained below in detail.Stream Delivery ServiceTCP is a stream-oriented protocol. It enables the sending process to deliver data as a stream of bytes and the receiving process to acquire data as a stream of bytes.TCP creates a working environment so that the sending and receiving procedures are connected by an imaginary "tube", as shown in the figure below:Sending and Receiving BuffersThe sending ... Read More

10K+ Views
In this post, we will understand the difference between informed search and uninformed search −Informed SearchThey contain information on goal state.It helps search efficiently.The information is obtained by a function that helps estimate how close a current state is, to the goal state.Examples of informed search include greedy search and graph search.It uses the knowledge in the process of searching.It helps find the solution quickly.It may or may not be complete.It is inexpensive.It consumes less time.It gives the direction about the solution.It is less lengthy to implement.Uninformed SearchThey don’t have any additional information.The information is only provided in the problem ... Read More

5K+ Views
Both Hubs and Bridges are network connecting devices and both of them broadcast data to every node on a network. Hubs operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Bridges connect various devices in a network.A bridge operates at the data link layer to connect multiple networks. It can read the outmost section of a data packet to tell where the message is going. A bridge can be programmed to reject packets from a particular network, so it can be used to reduce ... Read More

3K+ Views
A VPN connects a private network to another public network, which allows users to transmit and receive data as if their computers were connected to the private network physically.MPLS is a routing technique that is used to improve the speed and control of the network traffic. It speeds up traffic flows by avoiding complex lookups in the routing table at each node as in conventional routing algorithms.Read through this article to find out more about MPLS and VPN and how they are different from each other.What is VPN?VPN stands for virtual private networks. It is a network type that is ... Read More

1K+ Views
Have you ever seen http:// or https:// in a browser's address bar while surfing a website? In a nutshell, both of these are protocols that allow a web server and a web browser to communicate about a certain website. But, what are the features that distinguish these two? Well, the most important difference between "http" and "https" is that "https" is far more secure than "http". Read through this article to find out more about "http" and "https" and how exactly they are different from each other. The protocol used to send hypertext over the Web is called the HyperText ... Read More