CSMA/CD - Carrier Sense Multiple Access / Collision Detection

CSMA/CD: Explanation of the process

Rules must be observed when communicating in a group. This is no different with local networks: CSMA/CD regulates how data packet collisions must be handled in a LAN network. But what happens if several participants attempt to simultaneously carry out a transmission and the information gets lost? Carrier Sense Multiple Access with Collision Detection is an important procedure for smooth network...

CSMA/CA: Carrier Sense Multiple Access with Collision Avoidance

CSMA/CA: definition and explanation of the method

How do you achieve order in a wireless network? If all devices were to send information amongst themselves in an uncoordinated way, the data would rarely reach the recipient without problems. With CSMA/CA, there is a protocol that organizes the process and avoids collisions – without the need for central coordination. It’s a complex time management system. We go through the process step by step so...

What is Object Storage?

Object storage: The modern storage solution

Which storage method is the best solution for you or your company? You have several options to choose from. Object storage is relatively new, but already very popular. Data is turned into objects. Instead of using folders, everything is on the same level. How does object-based storage work? And what are the advantages?

What is ICMP protocol and how does it work?

What is the ICMP?

In the background, numerous protocols ensure that communication and data transmission work in computer networks. As the most prominent representative, the Internet Protocol plays a fundamental role. Without its’ various extensions and additions they would be nowhere near as versatile, as is the case in the current protocol. Thanks to the possibilities offered by ICMP protocol error messages and...

DNSSEC: internet standards for authenticated name resolution

DNSSEC: internet standards for authenticated name resolution

Without the Domain Name System, users of the World Wide Web would have serious problems when trying to load websites and other online presences. It’s only thanks to this system that internet addresses appear in their trusted text format: they’re actually nothing more than combinations of numbers. The communication between browser and name server responsible for this isn’t actually as secure as you...

SNMP tutorial

SNMP tutorial: how snmpwalk and snmpget work

The central monitoring and managing of network devices such as routers, switches, or firewalls is often carried out using the Simple Network Management Protocol (SNMP). Both snmpwalk and snmpget tools use SNMP messages, for example, to retrieve data sets of selected network participants. In our SNMP tutorial, we show what these two command line tools can do and how data retrieval works.

CIDR: Classless Inter Domain Routing

CIDR: what is classless inter-domain routing?

The internet – just like other large networks – must be precisely subdivided. The network classes, used until the 1990s and not yet completely gone from the scene, were far too inflexible for the requirements of the digital world. CIDR can help: With classless inter-domain routing, it’s possible to create effective subnets and routes. We explain how this works.

What is a root server? Definition and background

What is a root server? Definition and mechanics

When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for...

Make a bootable USB drive

Make a bootable USB drive and save your computer

Optical installation media are yesterday’s news. A bootable USB drive is not only faster and more practical than a CD-ROM, it can also do a lot more: For example, create a portable operating system with which you can use Windows as well as Linux computers. The most important function, though, is the ability to boot and repair a PC following a serious system problem. To make such a bootable USB...

Linux – the cost-effective alternative to Windows

Linux: a closer look at the open source operating system

There are many claims about Linux. Is it more secure than Windows? Or is it just more complicated? Although they are widespread in the server area, open source systems haven’t really made their way to PCs. What actually lies behind the cost-effective alternative? Is using a Linux operating system right for you? We’ve got the answers to these questions and more.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year