by Tarun Agarwal 3 years ago Gossip Protocol : Architecture, Working & Its Applications The data transmission across a large network (blockchain) is a challenging task. Transmitting similar data to myriad nodes across the large network utilizes a large amount of processing power; it takes a long time to make it & frequently...
by Tarun Agarwal 3 years ago BACnet Protocol : Architecture, Working, Types, Objects & Its Applications BACnet protocol was developed by a committee named ASHRAE or the American Society of Heating, Refrigerating & Air-Conditioning Engineers in 1987. The main motto of this committee is to make a protocol that would provide systems from...
by Tarun Agarwal 3 years ago I2S Protocol : Working, Differences & Its Applications Digital systems and its audio data requirements within Mobile Handsets, Computers & Home Automation products have dramatically changed over a period of time. Audio signal from or to the processors is becoming digitalised. This data...
by Tarun Agarwal 3 years ago User Datagram Protocol : Architecture, Working & Its Applications The User Datagram Protocol (UDP) in computer networking was developed in 1980 by David P. Reed. It is a standard protocol and is a part of the TCP/IP protocol over the internet. This protocol simply allows the applications of computers...
by Tarun Agarwal 3 years ago What is Microblaze Processor : Architecture, Working & Its Applications The MicroBlaze processor was developed in 2002 to integrate several complicated features to meet new as well as growing market demand. So, the MicroBlaze processor is an essential element within the Low-End Portfolio of Xilinx to enable...
by Tarun Agarwal 3 years ago What is File Transfer Protocol : Working, Types & Its Applications Transferring files is very easy between two systems but in some cases, some problems may occur while transferring. For instance, if we use two systems then they may have different file conventions, they represent data or text in different...
by Tarun Agarwal 3 years ago What is RISC V Processor : Architecture, Working & Its Applications RISC V is an Instruction set architecture developed by the University of California, Berkeley. The concept of RISC was motivated by the truth that most of the processor instructions were not utilized by most computer programs. So, unnecessary...
by Tarun Agarwal 3 years ago What is SIPO Shift Register : Circuit, Working, Truth Table & Its Applications Generally, a register can be defined as a device used to store the binary data but if you want to store multiple data bits then a set of Flip flops are used which are connected in series. The data which is stored in the registers can be...
by Tarun Agarwal 3 years ago JTAG : Pin Configuration, Working, Protocol Analyser, Timing Diagram & Its Applications JTAG (Joint Test Action Group) is a well-established IEEE 1149.1 standard that was developed in the year 1980 to solve the manufacturing issues that occurred within electronic boards or printed circuit boards. This technology is used to...
by Tarun Agarwal 3 years ago DNP3 Protocol : Architecture, Working, Function codes, Data format & Its Applications The DNP3 or Distributed Network Protocol3 was launched in the 1992 by a Japanese Corporation to establish a protocol for communication between distributed systems. DNP3 is network based device control protocol which is used for communication...