Skip to content

Category Archives: Computer Networks

CDMA stands for Code Division Multiple Access. CDMA was developed by QUALCOMM. This technology is used in UHF (ultra-high-frequency) cellular phone systems in the 800… Read More
Prerequisite: Telnet, Curl Terminal Network as the name suggests is an application layer protocol used to connect with hosts (remote machines) over a TCP/IP network.… Read More
Digital Subscriber Line Access Multiplexer or DSLAM is a network device that is used by the Internet Service Provider or ISPs often via locating them… Read More
Pre-requisite: Bluetooth Bluetooth is a short-range wireless communication technology designed to use in numerous applications. The architecture of Bluetooth defines two types of networks: Piconet… Read More
Z-Wave it is a wireless communication protocol used by automatic or automotive appliances for the purpose of connection and communication. It is invented in 1999… Read More
Communication is an important part of human existence and as time has passed the need for communicating has increased. Initially, letters/mails were written to carry… Read More
Ethernet and SDH are the technologies that are used for communication purposes. Ethernet and SDH are highly beneficial to their end-users. These both are very… Read More
Cyber security and network security have always been a topic of great concern and mostly in recent years and many technologies are developed to tackle… Read More
Z-Wave is a wireless communication protocol known for Home Automation. Wireless Communication protocol is simply a set of rules or some standards, an application, or… Read More
Pre-Requisite Types of Routing Static routing is a routing protocol that helps to keep your network organized and to optimize routing performance. It enables the… Read More
Pre requisite: What is Distributed System? Distributed System is a collection of autonomous computer systems that are physically separated but are connected by a centralized… Read More
Perfect Forward Secrecy is an encryption style that produces temporary private key exchanges between servers and clients. It is mostly used by calling apps, web… Read More
A password is a secret word or phrase or code that you need to know in order to have access to a place or system.… Read More
MD5 is a cryptographic hash function algorithm that takes the message as input of any length and changes it into a fixed-length message of 16… Read More
In a distributed system, one must consider many possible security risks. To mitigate these risks there are a number of strategies that can be employed: … Read More

Start Your Coding Journey Now!