Skip to content

Category Archives: Computer Networks

A computer network is an interconnected computing device that can exchange data and share resources. These connected devices use a set of rules called communication… Read More
UART means Universal Asynchronous Receiver Transmitter Protocol. UART is used for serial communication from the name itself we can understand the functions of UART, where… Read More
The PACELC Theorem is an extension of the CAP Theorem. One of the questions that CAP Theorem wasn’t able to answer was “what happens when… Read More
PeStudio is a tool to find suspicious artifacts within executable files to accelerate the first malware assessment. Using this tool, the analyst can easily spot… Read More
ARPANET included several protocols on the internet and NCP was one of them. NCP was a unidirectional or simplex protocol between two computers or devices.… Read More
Bi-Phase encoding is the best solution for synchronization. A transition occurs in the middle of each bit period that serves the synchronization and encoding of… Read More
RDT 3.0 is the last and best version of the Reliable Data Transfer protocol. Before RDT 3.0, RDT 2.2 was introduced, to account for the… Read More
Before understanding what a Data Link Connection Identifier (DLCI) is, we need to first get our hands on what a frame relay is. According to… Read More
RPL stands for Routing Protocol for Low Power and Lossy Networks for heterogeneous traffic networks. It is a routing protocol for Wireless Networks. This protocol… Read More
Before learning about File Servers, we need to understand why it is introduced into computer networks. Different users within a network need file storage and… Read More
RDT 2.1 protocol is the successor of RDT 2.0. While transmitting data in the transport layer, the issue of reliable transfer of data persists, the… Read More
The reliable data transfer protocol 2.2 is the successor of RDT 2.1. The prominent change in the RDT 2.2 is the exclusion of Negative acknowledgment.… Read More
This program is available on all Microsoft Windows servers (usually port 5985) that have this feature enabled. Of course, only if you have the credentials… Read More
A multinational information technology company based in India, Infosys Limited offers business consulting, IT, and outsourcing services. Founded in Pune and headquartered in Bangalore, Infosys… Read More
Demilitarized zones, or DMZ for short, are used in cybersecurity. DMZs separate internal networks from the internet and are often found on corporate networks. A… Read More

Start Your Coding Journey Now!