- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1042 Articles
Satish Kumar
327 Views
Introduction In context of distributed systems, exception handling refers to process of detecting, diagnosing, and recovering from errors that occur in a distributed system. In such systems, errors can occur at any point in communication and coordination process, including network failures, hardware malfunctions, and software bugs. Thus, effective exception handling ... Read More
Satish Kumar
1K+ Views
Introduction TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of most commonly used internet protocols. They are both responsible for ensuring reliable data transfer between devices connected to a network. However, way they do so differs significantly. In this article, we will discuss some examples of TCP ... Read More
Satish Kumar
485 Views
Introduction Human beings are social animals. They have always found ways to communicate and connect with each other. From ancient times, people used various forms of communication like writing, oral communication, and visual arts to convey their messages to others. With advent of technology, communication has become faster, easier, and ... Read More
Satish Kumar
1K+ Views
Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud ... Read More
Satish Kumar
809 Views
Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events ... Read More
Satish Kumar
102 Views
Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data ... Read More
Satish Kumar
840 Views
Ethernet is a widely used local area networking technology that enables devices to communicate with each other. Ethernet frames are basic units of data that are transmitted over Ethernet network. In this article, we will explore Ethernet frame format in detail, including various fields that make up frame and purpose ... Read More
Satish Kumar
140 Views
Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique ... Read More
Satish Kumar
55 Views
Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session ... Read More
Satish Kumar
75 Views
In today's digitally connected world, security is a critical concern for organizations of all sizes. With rise of cyber attacks, it has become imperative to implement security measures that not only provide protection but also adapt to evolving threats. One such security measure is Adaptive Security Appliance (ASA). An Adaptive ... Read More