Back

Vasvi Seth

Cyber Security Stude... • 8m

Delving into Communication Protocols: The Pillars of Network Transmission Communication protocols are fundamental to the exchange of information across networks. They govern how data is transmitted between devices, ensuring that communication is efficient and reliable. These protocols also include mechanisms to recover data lost in transit, maintaining the integrity of the information being exchanged.

0 replies6 likes

More like this

Recommendations from Medial

Vasvi Seth

Cyber Security Stude... • 8m

Exploring Communication Protocols: Transmission Control Protocol (TCP) Communication protocols are the cornerstone of network transmission, dictating how data is exchanged between devices. They ensure efficient and reliable communication, including

See More
0 replies5 likes

Vasvi Seth

Cyber Security Stude... • 8m

Decoding Network Protocols: Communication, Management, and Security Network protocols are the backbone of our digital world, enabling seamless communication between devices. These protocols can be broadly categorized into three main types: communica

See More
0 replies4 likes
1

Vasvi Seth

Cyber Security Stude... • 8m

Understanding Network Protocols: The Backbone of Digital Communication In the world of networking, protocols are crucial. A network protocol is essentially a set of rules used by two or more devices on a network to dictate the delivery and structure

See More
0 replies5 likes
Image Description

Amit Mundkar

Gen AI, Cybersecurit... • 10m

The AI Legends #75 Days Day 21: Claude Shannon Claude theory laid the groundwork for digital communication profoundly impacting how information is transmitted and processed in modern technology. History: Claude Shannon was born on 1916. Shannon ear

See More
3 replies15 likes
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:... • 1m

🚨 Top IoT Vulnerabilities You Need to Know! 🚨 🔹 Weak Passwords & Default Credentials – Many IoT devices ship with default passwords that are easy to guess. 🔹 Unpatched Firmware – Outdated software can have security flaws that hackers exploit. 🔹

See More
4 replies7 likes
Image Description
Image Description

yashu sharma

Hey I am on Medial • 2m

Internship Opportunity at a book website Post: intern (fresher) As an intern, you will: • Edit books information to the online library. • Organize and maintain the library data. • Research work . • Operate other library tasks. • Perform other

See More
3 replies4 likes
Image Description
Image Description

Ansh Kadam

Founder & CEO at Bui... • 4m

Here are 5 Ted Talks that will make you smarter and help you grow in life. 1 - How Great Leaders Inspire Action by Simon Sinek - Sinek explores the concept of the Golden Circle and explains why some leaders and organizations inspire action when othe

See More
7 replies11 likes
9
Image Description
Image Description

Mridul Das

Introvert! • 1m

Oxford scientists claim to have achieved teleportation using a quantum supercomputer. Here’s how this might work ( definitely it will take decades and even centuries to be realistic) :)👇 Example: AI Sending Optimized Code to the Past 1.Quantum Mem

See More
3 replies10 likes
3
Image Description
Image Description

Hawk

 • 

Medial • 8m

How do you use ChatGPT in your daily lives? I used the paid package of ChatGPT - I have used Custom instructions to train it as per my personality, age, location, speach structure etc - Since the paid module comes with the memory function it has al

See More
4 replies13 likes
1
Image Description
Image Description

Hawk

 • 

Medial • 13d

🚀 Automating Form Submissions / Leads with Slack / Airtable / SMS with N8N: A Step-by-Step Workflow Automation is a game-changer when it comes to handling form submissions efficiently. In this blog post, we'll walk through an N8N workflow that auto

See More
11 replies14 likes
9

Download the medial app to read full posts, comements and news.