Found 137 Articles for Networking

Books to read on networking and microcontrollers

Satish Kumar
Updated on 14-Mar-2023 16:03:55
Networking and microcontrollers have become ubiquitous in modern world, with demand for connected devices and smart homes on rise. If you’re looking to expand your knowledge on these topics, there are a plethora of books that can help you gain a better understanding of networking and microcontrollers. In this article, we’ll explore some of best books to read on networking and microcontrollers, along with their examples and sub-headings. "TCP/IP Illustrated, Volume 1: Protocols" by W. Richard Stevens TCP/IP Illustrated is a comprehensive guide to TCP/IP protocol suite, which is foundation of internet. This book covers all aspects of TCP/IP protocol, ... Read More

Difference between WAP and Router

Md. Sajid
Updated on 06-Mar-2023 10:53:44
Routers and wireless access points are the two most popular networking devices available in the market, both networking devices are used to connect different devices to the internet. The WAP is a piece of hardware that provides wireless network access. A Router is used to transfer the packets of data between the computer networks. And it accesses the devices like LAN through the different ports of LAN, which connect to the internet through a port called WAN. The equipment used to route data between networks is called a router. It is used to determine the best path for the transmission ... Read More

The 5G’s Role in IoT: A new Digital Revolution

Devang Delvadiya
Updated on 21-Feb-2023 11:22:26
The fifth era of wireless networks-5G will show up in the market with numerous appealing highlights that put it aside from its ancestor 4G network. With the help of the 5G, gadgets can communicate with each other as we people communicate with each other. An improved adaptation of the Internet of Things (IoT), Virtual Reality (VR), Augmented Reality (AR), as well as machine-to-machine learning (M2M) will be seen. This implies that remote medical surgeries, driverless vehicles, robotic applications, and drones are not simple prospects but impending real factors. 5G and IoT 5G alludes to the fifth generation of cellular ... Read More

What are Max parallel HTTP connections in a browser?

Shubham Vora
Updated on 07-Dec-2022 09:59:54
In this tutorial, we will learn about Max parallel HTTP connections in a browser. To know more about this topic, we will first understand what parallel connections are, the reasons behind blocking and how to solve it, and the browser limitations. Parallel Connections By entirely requesting the original HTML page, the first embedded item, the second embedded object, etc., a browser may naively process each embedded object in sequence. But it moves too slowly! HTTP enables clients to establish connections and parallelly carry out numerous HTTP transactions. Parallel Connections Could Speed Up Page Loading. If composite pages with embedded objects ... Read More

How Does the Access-Control-Allow-Origin Header Work?

Shubham Vora
Updated on 06-Dec-2022 12:14:30
In this tutorial, we will learn how access control allows the origin header to work. Access-Control-Allow- Origin is a header for CORS. With CORS or cross-origin resource sharing, browsers can permit a website hosted at origin A to request resources from origin B. Origin is a mix of port, hostname, and scheme, such as, rather than just the hostname. Here is an illustration of how this is put into practice − I want to obtain resources from origin B, which is, and origin A: The browser will deny my request and prevent me from accessing resources from ... Read More

What is Network Mapping or Nmap?

Pranav Bhardwaj
Updated on 02-Jun-2022 11:24:30
One of the most common problems with internet systems is that they are too complex for an average person to comprehend. Even a simple home-based system is complicated. The complexity of larger firms and agencies dealing with hundreds or even thousands of computers on the network increases dramatically.A tool called Nmap can be used to find out which ports are open and what the regulations are. This application scans the network to which a computer is connected and displays a list of ports, device names, operating systems, and other identifiers to assist the user in understanding the intricacies of their ... Read More

What is IP Blacklisting? (Challenges, How to Stay off the Blacklist)

Pranav Bhardwaj
Updated on 02-Jun-2022 10:32:08
Ensure that none of the devices on your network are affected. Once you've established that your network is clean and that no illegal traffic is being sent out, find out where your IP address was blacklisted or blocked, then contact them to have it removed.There will be multiple procedures to request an IP removal from each blacklist or blocklist. And just because you've asked for removal doesn't mean they'll follow through.Challenges with IP BlacklistingEven while blacklisting is an excellent approach to prohibit particular IP addresses from accessing your network, it isn't always successful. The reason for this is that attackers ... Read More

What are the differences between WiFi Extender and WiFi Booster?

Bhanu Priya
Updated on 25-Mar-2022 07:09:17
Let us understand the concepts of Wifi extender and Wifi booster before learning the differences between them.Wi-Fi ExtenderA Wi-Fi repeater, extender, or booster all are devices which are used to forward wireless signals from the router that covers a larger area like multiple floors of a house. A Wi-Fi extender, also called a wireless network extender or wired-wireless network extender, varies with a small difference.The Wi-Fi device uses both wired and wireless technologies to bring a wireless signal to an area of the home where network coverage has been weak. It enables all wireless devices within the expanded coverage area ... Read More

What are the differences between Spyware and Trojan Horse?

Bhanu Priya
Updated on 25-Mar-2022 06:47:56
Let us understand the concepts of Spyware and Trojan Horse before learning the differences between them.SpywareIt is a software program which can be installed on some user's personal computer or organization without their knowledge to gather personal information or view their browsing activities.We can defend Spyware by doing proper internet browsing, not clicking unwanted suspicious links, not clicking any download or accept buttons, and not agreeing to unwanted information.We can remove Spyware by using proper antivirus scan. After disconnecting from the internet remove any unwanted or added programs in the control panel and reboot system and do proper antivirus scan ... Read More

What are the differences between Malware and Ransomware?

Bhanu Priya
Updated on 24-Mar-2022 13:26:27
Let us understand the concepts of Malware and Ransomeware before learning the differences between them.MalwareMalware is called as malicious software which refers to a program that can infect a legitimate user's computer and harm on it in different ways. It can infect computers and devices in several ways and comes in a number of forms, just a few of which can include viruses, worms, Trojan horses and more.Computer viruses are probably the most familiar type of malware — so named because they spread by making copies of themselves. Worms also have a similar property. Spyware transmits personal information such as ... Read More
1 2 3 4 5 ... 14 Next