Encyclopedia

IGMP snooping

IGMP snooping: eavesdropping for multicast traffic

If a system in IP networks is to send data packets to different target hosts as efficiently as possible, an IP multicasting connection is the perfect solution. When it comes to multipoint transmission, the data packets are able to reach all interested parties thanks to various protocols such as GMP, for example. Switches and internet routers can also use the communication protocol for IGMP...

Network protocol: Standards for data exchange

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

Multicast

Multicast: Point-to-multipoint connection for efficient data transfer

Bandwidth plays an important role when sending data over IP networks. This is especially true when packets are being sent to more than one recipient, which can result in overloads preventing the data from being sent problem-free. Therefore, IP multicast was developed early on to enable data to be sent simultaneously to multiple destination nodes.

Unicast

Unicast: Targeted connection between two points

Do you want your data to reach just one recipient? Then send a unicast. Whether it is IPv4 or IPv6, unicasts find the right target. Accessing websites, sending e-mails, file transfers all use this form of addressing. But what is technically behind it, and how do unicast and multicast differ?

SSL certificate

SSL certificates

Security on the internet is always paramount: regardless of whether you run a website yourself or just surf the web, you should always understand the basics of internet security. Here we explain exactly what SSL certificates are and what you need them for. Encryption and authentication are the main purposes of certificates. They are intended to protect internet users’ personal data from criminal...

Display calendar week in Outlook

How to display calendar weeks in Outlook

Week numbering is deactivated in the Outlook calendar by default. Follow our illustrated, step-by-step instructions for how to display the calendar week in Outlook, and find out how to show week numbers in monthly view. This allows you to see at a glance which calendar week your appointments fall into.

Outlook read receipts

Outlook read receipts: How do you set one up?

Sending an e-mail is child’s play. As soon as the text has been written and the subject and destination address have been entered, just click on “send” and the electronic message is on its way. However, if the answer is delayed, doubts quickly arise as to whether the mail has arrived and been read. A remedy is to request a read receipt, which you can set up in Outlook in just a few steps.

JHipster

JHipster: the framework suite for modern websites

Framework use has become an integral part of modern web development. Designing back and front ends based on ready-made basic structures saves a lot of time. The website generator JHipster is an interesting solution that uses several tools to create server-and-client-side components. Which components distinguish the suite and how to install and use the software for your own project will be...

What is a CDN (Content Delivery Network)?

What is a CDN (content delivery network)?

If your online project is growing and beginning to attract international customers, the workload of your server is also increasing. High user numbers and the large geographical distribution of the clients result in ever-increasing loading times and slow transfer rates. By using a CDN (content delivery network), you’ll be able to react to increasing demands and optimise your data delivery.

UML: activity diagram

Activity diagrams: clearly present chronological activity processes with UML

UML activity diagrams help you to graphically illustrate the chronological sequence of system processes in object-oriented programming. They show which actions take place in which order to execute an activity. With a finished diagram, you can create code frames using XML transfer. Or do you want to map business processes? We show examples of how to create an activity diagram, which symbols belong...


Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year