Skip to content

Category Archives: Computer Networks

Prerequisite – Introduction to firewall in computer network and Types of Firewall 1. Traditional Firewall : A traditional firewall is network security device which typically… Read More
1. Stream Control Transmission Protocol (SCTP): SCTP is a connection-oriented protocol in computer networks that provides full-duplex association i.e., Transmitting multiple streams of data between… Read More
Over synchronous port, ISDN call, MIOX circuit, ACC call, and TDM group (being referred to as physical layer), the CREATE Command, as the name suggests,… Read More
Prerequisite – Router Step-1 : Set up Primary Router Figure – Set Up Primary Router To set up your primary router, connect the Ethernet cable… Read More
1. Next Generation Network : In short Next Generation Network is termed as NGN which is packet based network used for both telephony and data.… Read More
Simple Mail Transfer Protocol (SMTP) is an ASCII protocol. It is based on client-server model. It uses TCP port number 25 for this service. Therefore… Read More
Prerequisite – Web 1.0, Web 2.0 and Web 3.0 We have come long way since introduction of computers and with technology evolving every day, we… Read More
Qubes OS is desktop operating system that aims to provide security through isolation. It provides different environments with the help of virtualization. There is no… Read More
Internet has become one of important part of our life now days. When we are moving to digital world and everything is becoming automated as… Read More
Server Virtualization is most important part of Cloud Computing. So, Talking about Cloud Computing, it is composed of two words, cloud and computing. Cloud means… Read More
Logical Unit Number (LUN) Masking is process that grants control of data access by specifying LUNs which can be accessed by computer system. It is… Read More
Augmented Reality (AR) is type of Immersive Technology. Augmented reality is the overlay of digital content on the real-world environment. Virtual objects can be in… Read More
Point-to-Point Protocol (PPP) basically uses Authentication method to simply identify and determine the remote device. Authentication is also required to secure communication among two endpoints.… Read More
Loop configuration is basically a communication link that is used to transmit data or information from one link station to another link station conferring the… Read More
1. IP address : An Internet Protocol address (IP address) is the logical address of our network hardware by which other devices identify it in a… Read More

Start Your Coding Journey Now!