Skip to content

Category Archives: Computer Networks

In this article, we are going to discuss the overview of Ethereum Network and will discuss the benefits, and finally conclude with components of the… Read More
In this article, we will discuss the overview of the Open Vulnerability Assessment System (Open VAS) and will also cover its working, and its features,… Read More
Overview :In popular media, the term “hacker” refers to someone who uses bugs and exploits to get into someone else’s security, or who uses his… Read More
In this article, we will discuss the overview of URL and Browser with examples of both of them. And finally will conclude with the Maximum… Read More
In this article, we will discuss the overview of the Docking Station and will discuss its uses, features, working, and finally conclude with its types.… Read More
Prerequisite : OSI Model Introduction :The Application Layer is topmost layer in the Open System Interconnection (OSI) model. This layer provides several ways for manipulating… Read More
Overview :Create a simple client/server application in C using the concept of socket programming. Where server send some message to the client when getting connected.… Read More
If you are SpongeBob then your URL is Bikini Bottom on the floor of the Pacific Ocean but if you’re not, your URL is definitely… Read More
1. File Transfer Protocol (FTP) : It is a web standard that lets in the technique of document downloading and uploading on distinct pc structures from… Read More
A computer is a device that transforms data into meaningful information. It processes the input according to the set of instructions provided to it by… Read More
In a computer system, memory is a very essential part of the computer system and used to store information for instant use or permanently. Based… Read More
Rate limiting is a process to limit requests possible. It is used to control network traffic.Suppose a web server allows upto 20 requests per minute.… Read More
Prerequisite : Electronic Data Interchange (EDI) EDI Analyst :Electronic Data Interchange (EDI) is the interchange of information among different entities in a standardized format which… Read More
Overview :In this article, we will discuss IEEE 1901.2a in detail. While the majority of restricted network technologies are wireless, IEEE 1901.2a-2013 is a wired… Read More
In this article, we will discuss the overview of IPv6 and DNSSEC and will discuss the reason in detail with all these benefits why is… Read More