Ginni

Ginni

1,237 Articles Published

Articles by Ginni

Page 22 of 124

What are the physical components of a Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 3K+ Views

Computer networks rely on several essential physical components that enable devices to communicate and share resources. These hardware components form the foundation of network infrastructure, from small home networks to large enterprise systems. Network Interface Card (NIC) A Network Interface Card (NIC) is a hardware component that connects a computer or device to a network. The NIC handles the physical connection to the network medium and manages data transmission between the device and the network. Every device that connects to a network requires a NIC, which can be integrated into the motherboard or installed as a separate ...

Read More

What is the Function of Protocol?

Ginni
Ginni
Updated on 16-Mar-2026 11K+ Views

Protocol suites are collections of protocols that act at different layers of the network model to ensure successful communication. Protocols perform various essential functions that enable reliable data transfer across networks. Connection Establishment/Release Data transfer can be either connection-oriented or connectionless. Connection-oriented services establish a reliable communication path before data transfer, making them suitable for large volume transfers. Connectionless services, while faster, are less reliable as they don't establish a dedicated path. Encapsulation A protocol defines how data is encapsulated within frames or packets. Each Protocol Data Unit (PDU) contains control information fields alongside the actual ...

Read More

What is an Application Delivery Controller?

Ginni
Ginni
Updated on 16-Mar-2026 519 Views

An Application Delivery Controller (ADC) is a network device or software solution that manages and optimizes the flow of data between client connections and web or enterprise applications. ADCs serve as intelligent intermediaries that enhance application performance, security, and availability. ADCs are commonly deployed in application delivery networks (ADN) where they perform critical tasks to reduce the load on web servers and improve user experience. They are typically positioned between firewalls and application servers in a web farm within a demilitarized zone (DMZ). Application Delivery Controller Architecture Client ...

Read More

3-Layer of IOT architecture?

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

The Internet of Things (IoT) represents a network of physical objects or "things" that are embedded with sensors, software, electronics, and network connectivity. These components enable objects to collect and exchange data over the internet. The objective of IoT is to extend web connectivity from standard devices like computers and smartphones to everyday objects such as home appliances, vehicles, and industrial equipment. Components of IoT The IoT ecosystem consists of four fundamental components that work together to enable seamless data collection, processing, and user interaction: Sensors/Devices Sensors and devices are the foundation of any IoT system, ...

Read More

How does the MANETS AODV Reactive Routing Protocol work?

Ginni
Ginni
Updated on 16-Mar-2026 3K+ Views

MANET stands for Mobile Ad-Hoc Network. It is an infrastructure-less collection of mobile nodes that can arbitrarily change their geographic locations, creating networks with dynamic topologies composed of bandwidth-constrained wireless links. MANET nodes are equipped with wireless transmitters and receivers. Based on node positions, coverage designs, and transmission power levels, wireless connectivity exists between nodes in the form of a random, multi-hop graph. Current applications include defense services, emergency search and rescue, meetings, conventions, and scenarios requiring quick information sharing without fixed infrastructure. Unpredictable topological changes make route discovery and maintenance challenging in these networks. Conventional routing protocols ...

Read More

What is the MITM (Man in The Middle) Attack using ARP Poisoning?

Ginni
Ginni
Updated on 16-Mar-2026 646 Views

A Man-in-the-Middle (MITM) attack is a cyber attack where an attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other. This allows the attacker to eavesdrop on conversations, steal sensitive information, or manipulate the data being exchanged. In MITM attacks, the attacker positions themselves between the victim and their intended communication target, creating a scenario where all traffic flows through the attacker's system. This enables them to capture passwords, session tokens, personal data, and other sensitive information without the victims' knowledge. ARP Poisoning Attack ARP (Address Resolution Protocol) ...

Read More

What is Reverse Address Resolution Protocol (RARP)?

Ginni
Ginni
Updated on 16-Mar-2026 12K+ Views

The Reverse Address Resolution Protocol (RARP) is a network protocol described in RFC 903 that performs the opposite function of ARP. While ARP resolves IP addresses to MAC addresses, RARP resolves MAC addresses to IP addresses. This protocol is primarily used by diskless workstations and network devices that know their hardware address but need to discover their IP address during the boot process. How RARP Works RARP uses the same packet format as ARP but operates in reverse. A diskless system reads its hardware address from the network interface card and broadcasts a RARP request asking for its ...

Read More

What is ICMP Protocol?

Ginni
Ginni
Updated on 16-Mar-2026 5K+ Views

The Internet Control Message Protocol (ICMP) is a network layer protocol that provides error handling and diagnostic capabilities for IP networks. It serves as a companion protocol to IP, addressing its inherent limitations in error reporting and network management. IP protocol operates as a best-effort delivery service but has two significant deficiencies: Lack of Error Control − No mechanism to report delivery failures or routing problems Lack of Assistance Mechanisms − No way to provide feedback about network conditions IP also lacks mechanisms for host and management queries. Network administrators need to determine if routers ...

Read More

Explain the Orthogonal Frequency Division Multiplexing in Computer Network.

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

Orthogonal Frequency Division Multiplexing (OFDM) is an advanced frequency division multiplexing technique that transmits multiple data streams simultaneously over a single transmission medium by using closely spaced, mathematically orthogonal subcarriers. Unlike traditional FDM, OFDM allows subcarriers to overlap without interference because they are orthogonal to each other. This orthogonality means the subcarriers are mathematically perpendicular, enabling efficient spectrum utilization while maintaining signal integrity. How OFDM Works OFDM divides the available spectrum into numerous narrowband subcarriers, each modulated with a portion of the data stream. The orthogonality ensures that peak power of one subcarrier occurs at the null ...

Read More

What is Parallel Transmission in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 9K+ Views

Parallel transmission is a method of data communication where multiple data bits are transmitted simultaneously over separate communication channels or wires. Unlike serial transmission, where bits are sent one after another in sequence, parallel transmission sends several bits at the same time, significantly increasing data transfer speed. In parallel transmission systems, each bit of data travels on its own dedicated wire or channel. For example, to transmit an 8-bit byte, eight separate wires are used − one for each bit. This allows all eight bits to be transmitted concurrently rather than sequentially. Parallel Transmission ...

Read More
Showing 211–220 of 1,237 articles
« Prev 1 20 21 22 23 24 124 Next »
Advertisements