
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 155 Articles for Networking

5K+ Views
The Internet Relay Chat is a protocol used for live interactive internal text messaging or simultaneous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication messages as well as chat and data transfer including file sharing.IRC is the way of communicating in real time with people from all over the world. IRC has separate networks like IRC servers, machines which allow users to connect to IRC.Working of IRCGenerally, the user runs a program to connect to a server on one of the IPC nets.The server relays information to and forms other ... Read More

1K+ Views
Let us learn the concepts of Video Graphics Array (VGA) and High Definition Multimedia Interface (HDMI)Video Graphics Array (VGA)VGA stands for Video Graphics Array. It was first developed by IBM and is widely used for video cards, TVs, Computer monitors and Laptops.It has video signals RGBHV, which are as follows −RedGreenBlueHorizontal synchronousVertical synchronous.The picture quality degrades from digital to Analog conversion and back due to the Analog signal being susceptible to noise.It has 15 pins but is not hot pluggable.The conversions are as follows −VGA to DVIVGA to HDMIIt needs a separate Audio cable.Given below is the image of VGA ... Read More

2K+ Views
A botnet is called as a collection of infected devices which are internet connected and these devices are controlled by the cyber-criminal with the help of malware. Usually, users are unaware of a botnet that is affecting their PC. Botnets normally used to send spam mails, create unusual traffic, etc.Botnet is installed on the PC which is vulnerable because of outdated firewalls or antivirus.Once the target device gets affected the attacker can control bots with two approaches −Client server approach − In this approach, first a server is set up which then sends commands to bots via communication protocol. After ... Read More

4K+ Views
Let us understand the concepts of Client Operating System (OS) and Server OS before learning the differences between them.Client Operating System (OS)Client operating system is a system which works within computer desktops and other portable devices such as laptops and smartphones. Operating systems that are installed on the client’s computer device like PC, Laptop are called client OS.This operating system helps computers to run.Client OS manages different hardware components that are connected to printers, monitors and cameras.It supports a single user at a time.It is also capable of obtaining services from a server operating system.When compared to a server operating ... Read More

1K+ Views
A proxy server is a computer that offers a service to allow clients to make indirect network connections to the other network services. A client connects to the proxy server, and then requests a connection, file, or other resource available on a different server.Then the proxy provides the required resource either by connecting to the specified server or by obtaining through its cache.AdvantagesThe advantages of a proxy server are as follows −It helps the clients to protect their important information from getting hacked by hackers.The proxy server is also used to enhance the security and privacy level of the client's ... Read More

6K+ Views
A protocol is nothing but a set of rules which are followed by the communicating entities for data communication.The protocol depends on the following −Syntax − Syntax is the format of data which is to be sent or received.Semantics − Semantics is the meaning of every section of bits that are transferred.Timings − It refers to the time at which data is transferred as well as the speed at which it is transferred.The communication between the computers in the Internet is defined by different protocols. The protocols TCP (Transmission Control Protocol) and IP (Internet Protocol) build on the basis of ... Read More

4K+ Views
Cloud of Things (CoT) is an integration of Internet of Things (IoT) with Cloud Computing (CC). The Cloud of Things is a high-performance cloud-based IoT application platform that allows remotely monitoring, managing and control the IoT enabled devices.Architecture of Cloud of ThingsThe CoT is used to represent the ongoing trend for the next generation applications of IoT smart services.The IoT objects which generate a large amount of data that will be processed and analyzed in the Cloud in order to produce important information. That information is very sensitive information used by many smart services and/or applications.Therefore, to achieve the objective ... Read More

3K+ Views
DCOM is an extension of the Component Object Model (COM). Component Object Model explains how components and their clients interact. This interaction is the way the client and the component can connect without the need of any intermediary system component.Suppose when client and component are present on different machines, DCOM replaces the local Inter-process communication with a network protocol.Neither the client nor the components are aware that the wire that connects them has just become a little longer.The COM run-time provides object-oriented services to clients and components and uses RPC and the security provider to generate standard network packets that ... Read More

408 Views
Let us see the difference between Zoom vs Google Meet vs Webex by comparing their installations, features, strengths and weaknesses.ZoomThe installation requirements for Zoom are as follows −An internet connection (wired/wireless) with a minimum of 600 kbps (up/down) for 1:1 calling and 1 mbps (up/down) for group calling.Speakers and microphone (external or internal or even over Bluetooth).A webcam (built-in or USB plug-in)An internet browser or the zoom applicationA minimum of a single core 1Ghz processor or a dual core processor with 4GB of RAMFeaturesThe features of Zoom are as follows −Built-in tools for screen-sharingSupport for up to 1000 participants and ... Read More

713 Views
Token ring is a physical unidirectional ring, where the systems are connected to the ring through some interface.In the token ring a special frame is called a token which is always circulated on the ring. If a system has to transmit then it needs to acquire the token without a token no system can transmit. Only one system can transmit at a time. Hence it is collision free protocol.The token ring source is responsible for removing the frame from the ring. In normal token ring operation, a station sending information holds the token until the sending data circles the entire ... Read More