Skip to main content

Posts

Showing posts from May 2, 2021

All about 3G - third generation of mobile telephony

What is third generation of mobile telephony (3G)? 3G referred to as the third generation of cellular technology that permits mobile telephony. and this third-generation standard follows two earlier generations that were deployed on mobile networks and across mobile phones. The ITU (International Telecommunication Union) defined the third generation of mobile telephony standards International Mobile Telecommunications 2000 (IMT-2000) to facilitate growth, increase bandwidth and support more diverse applications. for instance, Global System for Mobile Communications (GSM) technologies could deliver not only voice, also the circuit-switched data across mobile networks at hastens to 14.4 kilobits per second (Kbps). To supporting the mobile multimedia related applications, however, In actual 3G standard had to deliver packet-switched data with better spectral efficiency at far greater speeds.| History of mobile telephony The first-generation (1G) standard got its start within the early 

Do You Know common network vulnerabilities?

In actual Networks suffer and the reason is hardware failure, administrator error, bugs in purchased or internally written software, and power and heating problems, but security has become a primary concern. Hacking is now a high-income profession, with hackers gaining access to valuable information, like social insurance numbers and confidential corporate or government information. Here we list down some common network vulnerabilities enterprise network teams should actively monitor for and methods they'll use to stop attacks. Phishing The term malware covers multiple forms of attack. Phishing and spear phishing are now common methods wont to capture login IDs and passwords. as an example, in phishing attacks, users open what appears to be a legitimate email, but the malware inserts code that seemingly causes the user accounts to exit. When the users log back in, the malware captures their keystrokes. Spear phishing is especially dangerous, because the attack typically focuses on

What is Client-Side? and What is Server-Side? - Client-Side Vs. Server-Side

In actual Client-side means the action takes place on the user’s (the client’s) computer. Server-side implies that the action takes place on a web server. So what can we mean by action? And why does some action happen on your computer and some on a server? When we say action we mean all that employment that programming languages do. you will be definitely remember from our term related to programming languages that they are the doers of the web. Programming languages like Ruby, Python, and JavaScript do things like: send an email, ask the bank what proportion money you've in your account, or tell a photograph slideshow to advance to the following image. In order for a programming language to do and do its job, the pc should understand the language its speaking. Almost every computer within the planet understands one programming language: JavaScript. For such type of reason, so many things which can be accomplished using JavaScript are often evaded needing access through the interne

Do you know about TCP 3-Way Handshake Process?

This could even be seen as the simplest way of how TCP connection is established. Before moving into the main points, allow us to study some basics. TCP stands for Transmission Control Protocol which indicates that it does something to manage the transmission of the info during a reliable way. The process of communication between devices over the web happens in step with this TCP/IP suite model(stripped out version of OSI reference model). the applying layer could be a top pile of stack of TCP/IP model from where network referenced application like applications program on the client side establish reference to the server. From the applying layer, the information is transferred to the transport layer where our topic comes into picture. the 2 important protocols of this layer are – TCP, UDP(User Datagram Protocol) out of which TCP is prevalent(since it provides reliability for the connection established). However you'll find application of UDP in querying the DNS server to urge the