- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 125 Articles for Protocols

108 Views
A network contains several groups of devices that communicate with one another through links. Devices are represented as hosts that are connected through switches, routers, hubs, modems, and access points with transmission mediums for communication purposes. Communication protocol specifies set of rules for exchanging data over a suitable network. Each protocol differs in its communication properties and can be connection−oriented or connection−less with a circuit or packet−switching techniques. Most of the common protocols used in networking are IEEE 802, Ethernet, Wireless LAN, SDH, ATM, Routing, etc. Here Ethernet and Synchronous Digital Hierarchy (SDH) are types of communication protocols used in ... Read More

320 Views
Both ICMP and IGMP are the network protocols of the OSI (Open System Interconnection) model. ICMP will track the messages and finds whether the data receives the destination of the network and IGMP will manage the users of the network. ICMP only diagnoses the network but does not involve in managing it. When a person working on the computer searches for some data on the Internet without an internet connection it gets an error message like the destination is unreachable and these types of error messages are sent using ICMP protocol. What is ICMP? ICMP comes under the network layer ... Read More

178 Views
This is a protocol used to control concurrency in a distributed database environment. It helps to ensure the consistency and integrity of data in distributed database systems. Concurrency control in databases allows multiple transactions to access the same data simultaneously. In this article, we will discuss the rules and regulations. That is required to keep in mind while applying MOSS Concurrency Control Protocol. Overview of Distributed Locking Distributed locking is a mechanism. It is used to synchronize access to shared resources in a distributed computing environment. It involves locking shared resources to prevent other transactions from accessing them concurrently. Distributed ... Read More

42 Views
Signaling protocols used in telecommunications networks include SS8 and the Signaling System. The Signaling System is a series of protocols designed by ITU-T for usage in telecommunication networks, whereas SS8 is a proprietary Signaling protocol developed by SS8 Networks. Read this article to find out more about SS8 and Signaling System and how they are different from each other. What is SS8? SS8 is a proprietary Signaling system that is used for lawful network interception and monitoring. It was developed by SS8 Networks, a US-based telecommunications and network security company. On telecommunications networks, SS8 provides real-time access to voice, data, ... Read More

360 Views
RDP (Remote Desktop Protocol) and Terminal Services are two related technologies that are extensively used in network environments to offer remote access to computers. While both RDP and Terminal Services offer remote access, there are a few key differences between the two. RDP is a protocol that allows remote access to a single desktop session, whereas Terminal Services is a Windows Server role that allows remote access to numerous sessions on a server. Read this article to find out more about RDP Services and Terminal Services and how they are different from each other. What are RDP Services? RDP ... Read More

316 Views
Discover how the TCP/IP model enables seamless communication between devices in computer networks. Enhance your infrastructure with our guide. Introduction to TCP/IP Model In today's fast-paced digital world, seamless communication between devices is crucial for efficiency and growth. The TCP/IP model, or Transmission Control Protocol/Internet Protocol, plays a significant role in enabling this level of connectivity across computer networks. Developed by Vint Cerf and Bob Kahn in the 1970s, this powerful protocol suite has become the backbone of modern internet architecture. In this article, we will explore the fundamental elements of the TCP/IP model and demonstrate why it remains one ... Read More

101 Views
From beginners to advanced users, everyone can benefit from learning TCL scripting's fundamental techniques. Read on for an easy-to-follow guide on using loops to find the sum of n natural numbers! Introduction TCL (Tool Command Language) Scripting is a scripting language used in various applications and platforms, including networking devices such as routers and switches. It is a simple, high-level scripting language that allows users to automate complex tasks by providing a set of commands to be executed. In the context of networking, TCL Scripting is used to automate the configuration and management of network devices. It can be ... Read More

165 Views
Introduction In today's digital age, securing online communication is more important than ever. One crucial component that plays a significant role in network security is Transport Layer Security (TLS). This widely-adopted security protocol helps to safeguard our privacy and data integrity when we send emails, browse the web, or use instant messaging and voice over IP applications. In this article, we'll explore the fundamentals of TLS—how it works, its importance in compliance with industry regulations, and why businesses can't afford to ignore its role in protecting against cyber threats. Understanding TLS TLS is an encryption protocol that provides secure online ... Read More

217 Views
Introduction The complexity of modern networks demands high adaptability and efficiency, making the understanding of Spanning Tree Protocol (STP) a crucial skill for any network professional. STP enables Ethernet switches to create loop-free topologies that prevent broadcast storms and ensure optimal network performance. One key aspect of STP is handling topology changes - adjustments made in response to link status or switch failures. This blog post will explore the different types of topology changes in STP, their impact on your network's communication, and methods for effectively monitoring and troubleshooting these changes. By gaining a firm grasp on this vital aspect ... Read More

176 Views
Don't let lost or delayed data hinder your communication network's performance! Check out this article discussing the challenges and solutions with Stop and Wait protocol. Introduction to Stop and Wait Protocol In today's world of fast-paced communication, the Stop and Wait protocol plays a crucial role in ensuring accurate data transmission between senders and receivers. This method involves sending one packet at a time and awaiting confirmation before moving on to the next, promoting reliability in simplex systems. However, like any system, it has its share of drawbacks like lost or delayed data and acknowledgments that can hinder performance. In ... Read More