Network Articles

Page 8 of 66

What is ICMP Protocol?

Ginni
Ginni
Updated on 16-Mar-2026 5K+ Views

The Internet Control Message Protocol (ICMP) is a network layer protocol that provides error handling and diagnostic capabilities for IP networks. It serves as a companion protocol to IP, addressing its inherent limitations in error reporting and network management. IP protocol operates as a best-effort delivery service but has two significant deficiencies: Lack of Error Control − No mechanism to report delivery failures or routing problems Lack of Assistance Mechanisms − No way to provide feedback about network conditions IP also lacks mechanisms for host and management queries. Network administrators need to determine if routers ...

Read More

Explain the Error Reporting Messages in ICMP Protocol

Ginni
Ginni
Updated on 16-Mar-2026 7K+ Views

The error-reporting messages in ICMP Protocol are generated when routers or hosts encounter problems while processing IP packets. These messages are sent back to the original source because the only addressing information available in a datagram is the source and destination IP addresses. When network devices detect issues like unreachable destinations, congestion, or header problems, they use ICMP error messages to inform the sender about the specific problem encountered during packet processing. ICMP Error Reporting Messages Destination Unreachable ...

Read More

What is FDDI in the Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 5K+ Views

FDDI stands for Fiber Distributed Data Interface. It is a collection of ANSI and ISO standards for data transmission on fiber-optic lines in a local area network (LAN) that can extend up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol and provides high-speed data transmission at 100 Mbps. FDDI is generally implemented as a dual token-passing ring topology, suitable for campus networks and building backbones. This dual-ring architecture provides fault tolerance, making it ideal for mission-critical network infrastructure. FDDI Architecture FDDI cabling consists of two fiber rings operating in opposite ...

Read More

What is Serial Transmission?

Ginni
Ginni
Updated on 16-Mar-2026 13K+ Views

Serial transmission is a method of data communication where bits are sent one at a time over a single communication channel, as opposed to parallel transmission which sends multiple bits simultaneously over multiple channels. With the importance of speed in data communications, it may seem logical to choose parallel transmission. However, most communication systems use serial mode due to practical advantages. Advantages of Serial Transmission There are two main reasons why serial transmission is preferred over parallel transmission: Cost-effectiveness over long distances − Serial networks require fewer physical wires, making them much less expensive ...

Read More

What is Asynchronous Transmission?

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

A transmission system is classified as asynchronous if it enables the physical channel to remain idle for arbitrary periods between transmissions. Asynchronous communication is well-suited for applications that generate data randomly, such as a user typing on a keyboard or browsing web pages with unpredictable intervals. The main challenge of asynchronous transmission stems from the lack of coordination between sender and receiver when the channel is idle. Since the receiver cannot predict when new data will arrive, additional synchronization mechanisms are required. How Asynchronous Transmission Works Asynchronous technologies typically require the sender to transmit extra bits before ...

Read More

What is Code Division Multiplexing?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

Code Division Multiplexing (CDM) is an advanced multiplexing technique used in cellular telephone systems and satellite communications. The specific version used in cell phones is called Code Division Multiple Access (CDMA). Unlike other multiplexing methods that rely on physical properties like frequency or time, CDM uses a mathematical concept based on orthogonal vector spaces. This allows multiple signals to be combined and separated without interference. How CDM Works In CDM, each sender is assigned a unique binary code called a chip sequence (Ci). These chip sequences are chosen to be orthogonal vectors, meaning the dot product of ...

Read More

What is the architecture of Asynchronous Transfer Mode?

Ginni
Ginni
Updated on 16-Mar-2026 8K+ Views

Asynchronous Transfer Mode (ATM) is a connection-oriented network technology where sender devices, known as end-points, connect through a User-to-Network Interface (UNI) to network switches. These switches communicate with each other through Network-to-Network Interfaces (NNI). ATM uses a hierarchical approach to organize traffic flow through virtual paths and virtual channels, providing efficient bandwidth utilization and Quality of Service (QoS) guarantees for different types of data transmission. ATM Network Architecture End Point A ATM ...

Read More

How to Build a Smart Contract in Blockchain?

Gaurav Tiwari
Gaurav Tiwari
Updated on 16-Mar-2026 446 Views

A smart contract is a self-executing computer program that runs on blockchain networks, utilizing distributed ledger technology to enforce the core principles of blockchain: distributed, trustless, and transparent operations. It is an immutable digital file containing predefined code and conditions that automatically execute when specific events occur. Smart contracts follow conditional logic patterns like If/else and do/while statements, enabling automated program execution without intermediaries. They offer significant advantages over conventional operations and are widely used in DeFi (Decentralized Finance) applications for virtual currency transactions with minimal fees. Components Required for Smart Contract Development To develop Ethereum-based smart ...

Read More

How to perform an exchange on sushiswap Blockchain?

Gaurav Tiwari
Gaurav Tiwari
Updated on 16-Mar-2026 285 Views

SushiSwap is a decentralized exchange (DEX) built on blockchain technology that enables users to trade cryptocurrencies without intermediaries. As a decentralized application (DApp), it operates on a peer-to-peer network where users maintain control of their funds throughout the trading process. Unlike centralized exchanges, SushiSwap uses automated market makers (AMM) and liquidity pools to facilitate trades. Users can swap tokens, provide liquidity to earn rewards, and participate in governance through SUSHI token ownership. Key Features of SushiSwap Token Swapping − Direct peer-to-peer cryptocurrency exchanges without order books Liquidity Mining − Users earn SUSHI tokens ...

Read More

Top 10 Common Security Log Sources

Pranavnath
Pranavnath
Updated on 16-Mar-2026 1K+ Views

In this article, we will explore the top 10 common security log sources that organizations use to monitor and protect their IT infrastructure. Security log sources are data generators that create event logs containing records of system activities, user actions, and security events. These logs serve as crucial evidence when security incidents occur, helping security specialists identify threats, analyze attack patterns, and respond to breaches effectively. Event logs contain software and hardware-related information that enables security teams to detect bugs, risks, and threats within their systems. Every organization should implement comprehensive log analysis based on regulatory requirements and established ...

Read More
Showing 71–80 of 655 articles
« Prev 1 6 7 8 9 10 66 Next »
Advertisements