
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
1K+ Views
Remote Procedure Call (RPC) is a communication protocol that enables a process running on one computer to invoke a procedure in another process running on a remote computer. procedure call appears to caller as a local procedure call, but in reality, call is transmitted over a network. RPC involves several ... Read More

Satish Kumar
955 Views
Introduction In context of distributed systems, exception handling refers to process of detecting, diagnosing, and recovering from errors that occur in a distributed system. In such systems, errors can occur at any point in communication and coordination process, including network failures, hardware malfunctions, and software bugs. Thus, effective exception handling ... Read More

Satish Kumar
4K+ Views
Introduction TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of most commonly used internet protocols. They are both responsible for ensuring reliable data transfer between devices connected to a network. However, way they do so differs significantly. In this article, we will discuss some examples of TCP ... Read More

Satish Kumar
1K+ Views
Introduction Human beings are social animals. They have always found ways to communicate and connect with each other. From ancient times, people used various forms of communication like writing, oral communication, and visual arts to convey their messages to others. With advent of technology, communication has become faster, easier, and ... Read More

Satish Kumar
4K+ Views
Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud ... Read More

Satish Kumar
3K+ Views
Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events ... Read More

Satish Kumar
440 Views
Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data ... Read More

Satish Kumar
5K+ Views
Ethernet is a widely used local area networking technology that enables devices to communicate with each other. Ethernet frames are basic units of data that are transmitted over Ethernet network. In this article, we will explore Ethernet frame format in detail, including various fields that make up frame and purpose ... Read More

Satish Kumar
612 Views
Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique ... Read More

Satish Kumar
2K+ Views
Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used ... Read More