
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1516 Articles for Computer Network

6K+ Views
Digital encryption technology plays a crucial role in data transmission over communication channels. Manchester encoding and differential Manchester encoding are two good methods for efficiently transmitting digital data. The purpose of this article is to comprehensively compare these two coding schemes and highlight their unique characteristics, advantages, and differences. Manchester encoding, known for its simplicity and widespread use, uses transitions at the beginning or end of each bit period to represent bit values. In contrast, differential Manchester coding, also known as biphase mark code, uses transitions to transmit values. This important difference gives rise to some conflicting properties that affect ... Read More

1K+ Views
As network administrators or anyone dabbling in network troubleshooting, you will often come across the terms 'ifconfig' and 'ip'. Both these commands are used in Unix-based operating systems for network interface configuration, but what makes them different? In this article, we will dissect the differences, delve into some examples and their outputs to understand these commands better. Introduction to Ifconfig Ifconfig (Interface Configuration) is a system administration utility in Unix and Unix-like operating systems to configure, control, and query TCP/IP network interface parameters. It is a part of the net-tools package which has been there almost since the inception of ... Read More

2K+ Views
The DMZ (Demilitarized Zone) and firewall are two important network security components that serve different purposes. A DMZ is a network segment that is intended to provide controlled access to resources from untrusted networks, such as the internet, while minimizing risk to the internal network. A firewall is a security device or piece of software that serves as a barrier between two networks, most commonly an internal network and the internet. Read this article to find out more about DMZ and Firewall and how they are different from each other. What is DMZ? A demilitarized zone (DMZ) is a network ... Read More

153 Views
Cisco Systems, an internationally recognized provider of networking and IT infrastructure solutions, offers both the CCNA and CCNP certifications. These industry-recognized certificates verify a person's knowledge and skill in Cisco networking technologies. While both certifications are about networking, they target different skill levels and cover different topics. Read this article to find out more about CCNA and CCNP and how they are different from each other. What is CCNA? Cisco Systems' CCNA (Cisco Certified Network Associate) certification is a well-known entry-level qualification. It is designed for people who have a basic understanding of networking concepts and desire to work in ... Read More

796 Views
VPN and VNC are two distinct technologies with different purposes. They both involve network connectivity, but they serve different purposes and operate at separate layers of the networking stack. VNC is a graphical desktop-sharing system that allows for network-based remote control and access to a computer's desktop environment. VPNs are mainly focused on establishing safe and private network connections over public networks while also providing encryption and anonymity. Read this article to find out more about VPN and VNC and how they are different from each other. What is VPN? A Virtual Private Network (VPN) is a technology that allows ... Read More

462 Views
The two most commonly used interfaces for connecting peripheral devices to computers are USB (Universal Serial Bus) and Firewire (IEEE 1394). While they both fulfil similar functions, they differ significantly in terms of technological specifications, data transfer rates, and usage scenarios Read this article to find out more about USB and Firewire and how they are different from each other What is USB? The USB (Universal Serial Bus) interface is a popular way to connect numerous peripheral devices to computers, laptops, and other electronic devices. It was designed to standardize device connection and communication, making it simple to add and ... Read More

664 Views
The LDAP (Lightweight Directory Access Protocol) protocol is an open standard for accessing and manipulating directory services. It is a lightweight, platform-independent protocol that allows for standardized interaction with directories. Microsoft's Active Directory (AD) is a directory service designed for Windows-based networks. Read this article to find out more about LDAP and Active Directory and how they are different from each other. What is LDAP? The LDAP (Lightweight Directory Access Protocol) protocol is an open standard for accessing and manipulating directory services. It is a lightweight, platform-independent protocol that allows for standardized interaction with directories. Microsoft's Active Directory (AD) is ... Read More

304 Views
Virtual Machines (VMs) and containers are both popular technologies used in modern computing environments to enhance application deployment, isolation, and scalability. While they serve similar purposes, there are fundamental differences between the two. What are Virtual Machines? A virtual machine (VM) is an emulation of a computer system that operates and runs applications as if it were a physical machine. It is created using virtualization software, which allows multiple operating systems (OS) to run simultaneously on a single physical server or computer. Here are some key characteristics and differences of virtual machines − Resource Isolation − Virtual machines provide strong isolation ... Read More

3K+ Views
Modern computing systems' primary building block is computer memory. It keeps track of the information and commands that the processor is currently executing. An address, which identifies the location of the data in memory, is used by programmes to access memory. Physical addresses and virtual addresses are two different kinds of memory addresses used in computing. Virtual addresses are mapped to physical addresses by the operating system, whereas physical addresses point to a specific physical location in memory. Virtual addressing shields the memory of one process from being accessed by another and enables the computer to utilise more memory ... Read More

617 Views
Introduction A time−based access list is a feature in network security tools that enables network administrators to control the traffic through a network based on the time of day, week or month. This type of access list allows administrators to increase security by only permitting specific users or devices to access the network during certain times, while blocking others. Definition of Time−Based Access-List A Time-Based Access−List (ACL) is a set of rules used to filter traffic passing through a router or switch based on date and time parameters. It is an extended version of an Access Control List ... Read More