Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Pranavnath
Page 20 of 39
Deep Web: The Dark Side of Internet
The deep web refers to all parts of the internet that are not indexed by standard search engines like Google, Bing, or Yahoo. This includes password-protected sites, private databases, email inboxes, and internal company pages. The dark web is a small subset of the deep web that requires special software like Tor to access and is intentionally hidden from conventional browsers. While often confused, these terms represent different concepts. The deep web is largely legitimate content that simply isn't publicly searchable, whereas the dark web specifically refers to encrypted networks designed for anonymity. Layers ...
Read MoreWPAN Technologies for IoT/M2M
Internet of Things (IoT) devices connect to real-world entities to send and receive data over the internet. Here "Things" refers to any physical entities like smartwatches, health monitoring devices, home appliances, and traffic systems. These devices analyze information from their surroundings and make decisions with minimal human interaction, transmitting results through connected networks to receiver devices such as laptops, tablets, or smartphones. Machine to Machine (M2M) communication enables two or more devices to share functions and data within the same network. These devices can exchange, analyze, and transmit data without human intervention, operating with or without internet connectivity. M2M ...
Read MoreFiber Optics and its Types
Fiber optics is a technology that transmits data through thin glass or plastic fibers using light signals. It is widely used in communication channels such as telephone networks, television systems, and the Internet. The technology works by converting electrical signals into light at the input side and then converting them back to electrical signals at the output side. Fiber optic cables consist of three main components: a core that carries light signals, cladding that reflects light back to the core preventing signal loss, and a protective coating that shields the cable from environmental damage. Structure of Fiber Optic ...
Read MoreZ-Wave Protocol
Z-Wave Protocol is a wireless communication protocol specifically designed for smart home devices. It was introduced in 2004 by Danish company Zensys, which was later acquired by Sigma Designs in 2009. Z-Wave operates as a low-power, low-bandwidth protocol in the sub-gigahertz range. This allows it to achieve longer range and better penetration through walls and floors compared to conventional Wi-Fi or Bluetooth technologies. The protocol uses a mesh network topology, where devices communicate with each other directly or through intermediate nodes. Each device in the network acts as a repeater, ensuring that signals can reach devices that are ...
Read MoreAdvantages and Disadvantages of Internet
The Internet is a global network of interconnected computers that enables billions of devices worldwide to share data, communicate, and access services. From social media platforms like Instagram and Facebook to essential services like online banking and e-commerce, the Internet has become an integral part of modern life. Organizations, governments, and individuals rely on Internet connectivity for everything from remote work and education to healthcare and entertainment, making it nearly impossible to imagine our world without this vast digital infrastructure. Internet: Global Network Connection Internet ...
Read MoreWhy does Youtube use TCP not UDP?
YouTube, the world's largest video streaming platform, uses TCP (Transmission Control Protocol) instead of UDP (User Datagram Protocol) for delivering video content to ensure reliable, high-quality streaming experiences for billions of users worldwide. While both protocols have their strengths, YouTube's choice of TCP is driven by specific requirements for video-on-demand services where data integrity and complete delivery take priority over minimal latency. TCP vs UDP for Video Streaming Feature TCP UDP Reliability Guaranteed delivery with error correction No delivery guarantee Connection Connection-oriented (3-way handshake) Connectionless Data ...
Read MoreEfficiency of CSMA/CD
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a medium access control protocol standardized as IEEE 802.3, widely used in Ethernet networks. It allows multiple stations to share a broadcast medium by sensing the channel before transmission and detecting collisions when they occur. The efficiency of CSMA/CD is crucial in determining its suitability for different network environments and directly impacts overall network performance. How CSMA/CD Works CSMA/CD operates using a simple but effective mechanism: Carrier Sensing − Stations listen to the channel before transmitting to check if it's idle Multiple Access − ...
Read MoreWhy HTTP is not secure?
HTTP stands for Hypertext Transfer Protocol. It is a set of rules that defines how data is transmitted between web browsers and servers on the World Wide Web. HTTP is an application layer protocol used for transferring hypermedia documents such as HTML pages, allowing users to communicate and access information online. The fundamental issue with HTTP is that it transmits data in plain text format without any encryption. This means that any data sent between your browser and a web server − including usernames, passwords, personal information, and browsing activity − can be easily intercepted and read by malicious ...
Read MoreGPRS architecture in wireless communication
General Packet Radio Service (GPRS) is a packet-switched data service that extends GSM (Global System for Mobile Communications) architecture to provide enhanced data transmission capabilities. While GSM uses circuit-switched technology for voice calls, GPRS introduces packet-switched services for efficient data communication. GPRS revolutionized mobile data communication by allowing multiple users to share the same radio resources simultaneously, achieving data rates from 9.6 to 171 kbps compared to GSM's 14.4 kbps circuit-switched data service. GPRS vs GSM Comparison Feature GSM GPRS Switching Method Circuit-switched Packet-switched Data Rate 14.4 kbps ...
Read MoreEncryption, its Algorithms and its Future
Encryption is a method to protect data by transforming plain text into an encoded format called cipher text. The main purpose of encryption is to secure data transmission and storage from unauthorized access and attacks. There are two primary types of encryption: symmetric encryption (using a single shared key) and asymmetric encryption (using a pair of public and private keys). Encryption Process Plain Text "Hello World" Encryption Algorithm + Key Cipher Text ...
Read More