CategoryInternet

VoIP – Voice over Internet Protocol

V

Voice over Internet Protocol is a method of placing phone calls using the Internet. The old digital telephony is very costly and placing an international call can cost a fortune. On the other hand, Internet is very cheap these days. So VoIP calls are virtually free. The old calling technology used Public Switched Telephone Network or Circuit Switched Network to place a call. Voice over Internet...

How a website works

H

Just as you view a file on your computer by opening it in software like Notepad or Microsoft Word, a website is a file on a server which you open/browse by using a specific software, i.e. a Web Browser. Some common examples of web browser are Mozilla Firefox, Safari, Google Chrome, Internet Explorer. You can open the website in a web browser on your computer, interact with the content on the...

Mobile Internet Generations

M

Mobile phones are everywhere. Chances are that you are viewing this website on a mobile phone using mobile internet. If you are an average internet user you might have heard of the term 2G, 3G, 4G and so on with respect to mobile internet. The G here means the generation of cellphone network or mobile internet technology. The generation is defined as a set of telephone network standards. 1G: The...

Network Types – LAN/WAN/MAN/PAN

N

Local Area Network (LAN) – LAN is usually present in a local area, usually an office or home. LAN is very small in size and generally very fast since all devices are almost right next to each other. A LAN is generally of two types – based on Ethernet (i.e. wired) and based on WiFi (i.e. wireless). This is the most common way to connect computers in schools, colleges and other...

Network addressing

N

Network Addressing consists of various terminologies which are explained below. To learn how Internet works, click here. MAC Address In network addressing, is the physical address of a communication device. It is assigned to the device by the manufacturer and is also called as the “hardware address” or the “burned in” address of the device. This address usually cannot be...

P2P Networks

P

In traditional networks, there is a computer server which receives requests from various computers, processes those requests and sends data back to the computer. Generally, for every server, there are a lot more computers who are sending requests to the server. Thus, the server is the main device which is spending its resources. On the other hand, in a peer-to-peer (P2P) network, all the...

Search Engine

S

The Internet is full of millions of websites having billions of pages. These web pages have text, audio, photographic and video content. New online content is being generated by users every second of every single day. To maintain a record of this content will be difficult for everyone. Worse yet would be finding something particular from this data. Since every user may need to search for...

Net Neutrality

N

The openness of the internet is what has led to such a large scale growth of its usage and prevalence in the world. Network neutrality refers to the principle that states that all internet traffic must be treated equally by all Internet Service Providers (ISP) irrespective of the nature of data being transmitted through a connection. Where there is discrimination of internet traffic based on the...

File Transfer Protocol (FTP)

F

FTP stands for File Transport Protocol, and it does what the name says, i.e. it helps in transferring files between two computers over a network. This protocol works by using two connections between the user’s computer (client) and the server. One connection is called the command channel where only commands are sent from the client to the server. The other connection is called data channel...

POP, IMAP and SMTP

P

A user having an email account on a website can easily access his electronic mail by opening the website and logging into his account. But there is another way by which the user can access his electronic mail without opening the website specifically. Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) are two protocols used for accessing email remotely. For this, you need a...

The Cyber Cops Logo

About “The Cyber Cops”

Please see About page for more on The Cyber Cops project.

In case you have any suggestions, please do get in touch through by emailing me at aman@thecybercops.net or amandeep.89@ips.gov.in

All content is copyright material. For using it, please contact on the email address mentioned above – the policy is quite liberal for allowing the use of content from this website. Some of the content is taken from Wikipedia. If content has been sourced from another website, it has been mentioned on the relevant page itself. This project shows its gratitude towards the Wikipedia Project.