The Asynchronous transfer mode is shortly called the ATM. The data can be transferred through broadband communication and works at high speed. It uses a new technology called broadband communication. The transfer of data can be based on packet switching. ...
Snabay Networking Latest Articles
What is Data Communication
Let us first know the brief introduction to the data communication. As we know the term communication represents the transfer of data between the two devices either from sender to receiver or receiver to sender. Similar to this, data communication ...
What is Computer Virus, Types of Computer Virus
The computer virus is similar to the human affected virus, that affects computer systems. It can pass spread through one computer to the other computer. How can it pass through several computers?. It many through malicious code. The virus can ...
Artificial Intelligence and Machine Learning
In the rising technology, many people are dreamed of talking robots, flying rockets. This is where artificial intelligence came into life. Artificial intelligence is nothing but, the work done by humans can be done with the help of artificial intelligence. ...
Code Division Multiple Access
Introduction: Code Division Multiple Access(CDMA) is a communication channel used to send the signal through various communication technologies in CDMA serval users can share the bandwidth and also this CDMA acts as interface several users. Every channel has a specific ...
Networking Devices
We have many types of devices. It may be networking devices or it can be intermediary devices that present in the computer network. Let us learn about various types of devices that are present in the computer network. There are ...
Basic Switch Configuration
To know about basic switch configuration, let us first use a packet tracer network simulator software. Any network simulator can be used or also a real cisco switch. Until the selected software which you are using is containing the commands, ...
Attacking Network Protocols PDF Download
Were you searching to download Attacking Network Protocols PDF? Well, you are at right place. I have given the download link of the pdf below but before that please go through the table of content of the pdf to know ...
What is Network Security
Specialized networks that are built to protect your network’s usability are known as network security. The protection provided by the network security system is extended to your data too. Usually, your network security system protects the integrity of your network ...
What is Administrative Distance, Metrics
An administrative distance when two or more routing protocol configure in the network for transmitting data source to destination. An administrative destination defines which route or routing protocol will be best to transmit data. Lower the value higher the priority. ...