Home Blog Page 34
Manipulators in C++ with Example

Manipulators in C++ (with Examples – setw, setbase, ends, setfill, flush, ws)

Manipulators are special functions that can be included in the I/O statement to alter the format parameters of a stream. To access manipulators, the...
data communication

Data Communication: Types, Components, Characteristics & Functions

Data communication is the electronic exchange of data between two devices across a communication channel like a wire pair cable or Fiber optics. In this...
multiplexing

Multiplexing (FDM, WDM, TDM): Use, Type, Technique, Computer Networking

We'll go through the notion of multiplexing in computer networks in this tutorial. We have shared all the basic information about MUX used in...

Cyclic Redundancy Check (CRC) for Data Error Detection (With Example)

Bits can be corrupted while being transported over a computer network owing to interference and network difficulties. Errors are caused by corrupted bits, which...
physical layer

Physical Layer in OSI Model: Functions, Issues, Protocols & Device

Open System Interconnection (OSI) Model has seven-layer and Physical Layer is the lowest layer and is concerned with wiring and electrical standards. It provides...

TCP/IP Model (Internet Protocol Suite): Functions, ICMP, Transport Layer

TCP/IP Model stands for Transmission Control Protocol/Internet Protocol Model. The TCP/IP model contains four layers from the seven layers of the OSI model. Hence...
Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol (HTTP): HTTPS Difference, Work, Type, Proxy

HTTP full form is Hypertext Transfer Protocol, which is an application layer network protocol built on top of TCP. HTTP provides a standard for...

Application Layer Protocols: Types & Example (HTTP, DNS, SMTP, FTP)

In this article, we have shared all the basic information about Application Layer Protocols with their types, examples, uses, and functions of protocols in...
user datagram protocol

User Datagram Protocol: UDP Vs TCP, Work, Header, Use, DDoS Attacks

User Datagram Protocol, in short UDP, is one of the core members of the Internet protocol suite In computer networking.Computer applications can send messages...

Congestion control in Computer Networks: Types and Techniques

Congestion Control is also known as TCP Congestion control. TCP refers to Transmission Control Protocol that uses a network congestion-avoidance algorithm.It includes various aspects...