
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 190 Articles for Technology

2K+ Views
In a distributed system, multiple computers work together to provide a cohesive service to users. One of most critical components of a distributed system is ability to access files stored on different computers in network. Different file accessing models have been developed to manage this complexity and ensure efficient and secure file sharing. In this article, we will explore various file accessing models in a distributed system. Centralized File Accessing Model In a centralized file accessing model, all files are stored on a single server or node, and users access these files through server. This model is simple to implement ... Read More

454 Views
In today's digital age, high-speed internet is no longer a luxury but a necessity. With growing demand for streaming services, video conferencing, and online gaming, traditional copper-based internet connections are becoming outdated. Fiber optics broadband connection has emerged as go-to solution for reliable, high-speed internet that meets needs of modern-day user. In this article, we will explore what fiber optics broadband connection is, its benefits, and its applications. What is Fiber Optics Broadband Connection? Fiber optics broadband connection is an internet connection that uses fiber-optic cables to transmit data. Unlike traditional copper cables, which transmit data through electrical signals, fiber ... Read More

1K+ Views
In a distributed system, message passing is a critical component of communication between processes or nodes. Message passing allows processes to share data, coordinate their activities, and respond to changes in system. A well-designed message passing system can improve performance, reliability, and scalability of a distributed system. In this article, we will discuss features of good message passing in distributed systems and provide examples of how these features can be implemented. Reliability Reliability is one of most important features of message passing in distributed systems. Messages should be delivered to intended recipient, even in presence of failures, network delays, and ... Read More

661 Views
Introduction The Enhanced Interior Gateway Routing Protocol (EIGRP) is a widely used routing protocol in computer networks. It is an advanced version of Interior Gateway Routing Protocol (IGRP), which was developed by Cisco Systems. EIGRP is an advanced, distance vector, routing protocol that provides faster convergence and better scalability compared to other distance vector routing protocols. This article will discuss features of EIGRP that make it one of most preferred routing protocols for large networks. Fast Convergence One of significant features of EIGRP is its fast convergence. Convergence is process by which all routers in a network come to agree ... Read More

2K+ Views
Introduction Transmission Control Protocol (TCP) is a widely used protocol for data transmission over internet. However, data transmission over TCP is not always error-free. transmission can be disrupted due to several reasons such as network congestion, packet loss, or failure of intermediate devices. In such cases, TCP uses a loss recovery technique to recover lost data and retransmit it. This technique is crucial in ensuring reliability of data transmission over internet. In this article, we will discuss fast recovery technique for loss recovery in TCP. Understanding TCP loss recovery technique TCP uses a three-way handshake mechanism to establish a connection ... Read More

517 Views
Introduction Access control lists (ACLs) are an important component of network security. ACLs are used to regulate network traffic and restrict access to network resources. An ACL is a set of rules that is applied to a network interface, router or firewall, which dictates which packets are allowed to pass through and which are dropped. ACLs can be either standard or extended, and they can be configured to allow or deny traffic based on source and destination IP addresses, protocols, and port numbers. In this article, we will explore extended access list in network security, its importance, and how to ... Read More

716 Views
Introduction When building client-server applications using sockets, it's essential to assign a unique port number to each client to ensure proper communication between server and clients. By explicitly assigning a port number to each client, server can identify and communicate with individual clients without confusion or overlap. In this article, we'll explore importance of assigning port numbers to clients and how to do so effectively. What is a port number? In context of networking, a port number is a 16-bit unsigned integer that uniquely identifies a specific process to which a network packet is directed. When a client sends a ... Read More

1K+ Views
Remote Procedure Call (RPC) is a communication protocol that enables a process running on one computer to invoke a procedure in another process running on a remote computer. procedure call appears to caller as a local procedure call, but in reality, call is transmitted over a network. RPC involves several aspects such as marshaling of parameters, handling of return values, and communication between client and server. In this article, we will focus on parameter passing semantics in RPC. We will discuss various parameter passing methods and their characteristics, including pass-by-value, pass-by-reference, pass-by-result, and pass-by-object-reference. We will also provide examples to ... Read More

439 Views
Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data is transmitted over Ethernet network. In this article, we will discuss Ethernet transmitter algorithm, its subheadings, and examples. Overview of Ethernet Transmitter Algorithm The Ethernet transmitter algorithm is a set of rules that governs transmission of data packets over an Ethernet network. algorithm ensures that data packets are transmitted in ... Read More

609 Views
Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique used in computer networks to combine multiple physical links into a logical link. goal is to increase available bandwidth and provide redundancy, fault tolerance, and load balancing. In an EtherChannel, multiple physical links are bundled together, appearing as a single logical link to network devices connected to it. Benefits of ... Read More