- Trending Categories
- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 496 Articles for Computer Engineering
2K+ Views
Both Site-to-Site VPN and Remote Access VPN are types of virtual private networks used primarily for transferring data and accessing a machine from a remote location under a secure network which acts as a private network across the machines.In this article, we will differentiate Site-to-Site VPN and Remote Access VPN based on their features. Let's start with an overview of VPN and the role it plays.What is a VPN?A Virtual Private Network (VPN) connects users' computers to a private network across a public network, enabling them to receive and send data as if they were physically attached to the private ... Read More
7K+ Views
Both Synchronous and Asynchronous Transmission are types of serial data transmission techniques in which data is transmitted between the sender and the receiver based on a clock pulse used for synchronization.Read through this article to find out more about synchronous and asynchronous transmission and how they are different from each other.What is Synchronous Transmission?Synchronous transmission is a technique of data transmission in which a sender transmits a continuous stream of data along with periodic timing signals supplied by an external clocking system in order to ensure that the transmitter and the receiver are in sync.In Synchronous transmission, data is transferred ... Read More
1K+ Views
Circuit switching and Message switching are both telecommunication techniques that are used to transfer data from a source to a destination with minimal loss in transmission.Circuit switching is a way of constructing a dedicated network in which two network nodes create a dedicated communications channel before connecting. In message switching, the source and destination nodes are not connected; the intermediate nodes are in charge of data transfer.Read through this article to find out more about Circuit switching and Message switching and how they are different from each other.What is Circuit Switching?In circuit switching, networks create dedicated transmission channels. While other ... Read More
315 Views
As we know that both DES and AES are the type of symmetric key block cipher which are used in such encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Now on the basis of characteristics we can distinguish between AES and DES.Following are the important differences between DES and AES ciphers.Sr. No.KeyDES CipherAES Cipher1DefinitionData Encryption Standard also known as DES is a symmetric key block cipher that was introduced in the ... Read More
7K+ Views
In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can be grouped into two categories: Synchronous counters and Asynchronous counters.Read through this article to find out how these two types of counters function and how they are different from each other.What is a Synchronous Counter?If the "clock" pulses are applied to all the flip-flops in a counter simultaneously, then such ... Read More
195 Views
When I say machine learning, it reminds me a subject for the B.Tech Mechanical stream. No this is not a session of machine learning or it’s not related to your regular subject knowledge. The topic remains the same but it’s still different. So before we go to the point why should we be bothered about what is machine learning. We should now see what is machine learning actually.What is Machine Learning?Machine learning is a subcategory or to a say, a type of artificial intelligence (AI) which gives computers, a privilege to learn without being explicitly programmed. It mainly focuses on ... Read More
55K+ Views
Computer software is a set of instructions or programs instructing the computer to do specific tasks. Software is basically a generic term used to describe computer programs. In general, scripts, applications, programs and a set of instructions are all terms often used to describe a software. On the basis of language in which software is developed and platform which is required for its execution, we can group different types of software into two categories: System Software and Application Software. Read through this article to find out more about System Software and Application Software and how they are different from ... Read More
898 Views
Both VPN and Proxy are used to connect to a remote system where one can access the host system from a remote location. However, VPNs are superior than Proxy servers because a VPN can protect your privacy and security by routing your traffic via a secure VPN server and encrypting it. A Proxy, on the other hand, just routes your traffic via a mediating server and it does not provide any additional security.Read through this article to find out more about VPN and Proxy and how they are different from each other.What is a Virtual Private Network (VPN)?A virtual private ... Read More
3K+ Views
QoS traffic scheduling is a scheduling methodology of network traffic based upon QoS (Quality of Service). Here, the frames or packets are mapped to internal forwarding queues based on its QoS information, which are then services according to a queuing scheme.Typically, multiple queues are present each with different priority levels. The scheduler decides the type of treatment to be given to the traffic in each queue. When traffic is available, the scheduler maps it to the appropriate queue. For example, video and voice traffic are kept is queued with higher priority than background traffic.Notable QoS Traffic Scheduling MethodsWeighted Round Robin ... Read More
348 Views
Worldwide Interoperability for Microwave Access (WiMAX), is a wireless microwave technology based on the IEEE 802.16 standards. It was originally published in 2001 by WiMAX forum, the version which is now called fixed WiMAX. It is similar to Wi-Fi, though it provides higher data rates up to 1 Gbps even at distances of 30 miles.WiMAX forum defines WiMAX as – A standards-based technology enabling the delivery of last-mile wireless broadband access as an alternative to cable and DSL.Features of WiMAXWiMAX is a coalition of wireless industry based upon IEEE 802.16 standards.It aims for the advancement of broadband wireless access (BWA) ... Read More