
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1515 Articles for Computer Network

496 Views
iSCSI represents Internet Small Computer Systems Interface. It is a transport layer protocol that works on top of the Transport Control Protocol (TCP). It enables block-level SCSI data transport between the iSCSI initiator and the storage target over TCP/IP networks. iSCSI supports encrypting the network packets and decrypts upon arrival at the target.There are multiple means of transports that can be used for iSCSI. The most common is TCP/IP over Ethernet, but Remote Direct Memory Access (RDMA) can also be used with iSER, which is iSCSI Extensions for RDMA. If using iSER, the transport is RoCE or InfiniBand, and the ... Read More

1K+ Views
DAS stands for Direct-attached storage. It is computer storage that is connected to one computer and not accessible to another. The System of DAS is attached directly to the computer through the HBA (Host Bus Adapter).As compared to NAS devices, its device attaches directly to the server without the network. The modern systems of this storage device include the integrated controllers of a disk array with advanced features.TypesThere are two types of DAS which are as follows −Internal DASIn internal DAS design, the storage device is privately linked to the server through a serial or parallel bus.External DASIn external DAS ... Read More

5K+ Views
I2C ProtocolI2C stands for the inter-integrated controller. It is a serial communication protocol that can connect low-speed devices. It is a master-slave communication in which we can link and control multiple slaves from a single master. In this, each slave device has a specific address.SPI ProtocolSPI is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master, and the other called a slave. In this protocol, devices are linked in the master-slave relationship.The major differences between I2C protocol and SPI protocol are as follows −I2C ProtocolSPI ProtocolThere are two ... Read More

2K+ Views
SPI stands for the Serial Peripheral Interface. SPI is a general-objective synchronous serial interface. During an SPI transfer, send and receive data is simultaneously shifted out and in serially. It was created by Motorola in the mid-1980 for inter-chip communication. The SPI is used to authorise a microcontroller to communicate with peripheral devices such as E2PROMs.SPI devices transmitted using a master-slave relationship. Because of its lack of built-in device addressing, SPI needs more effort and more hardware resources than I2C when more than one slave is involved. But SPI tends to be easier and more efficient than I2C in point-to-point ... Read More

943 Views
MQTT represents Message Queuing Telemetry Transport. It is a highly lightweight and publish-subscribe messaging transport protocol. This protocol is helpful for the connection with the remote location where the bandwidth is a premium. These features make it useful in multiple situations, including a stable environment such as communication machine to machine and the internet.MQTT was initially invented and developed by IBM in the late 1990s. Its original application was to link sensors on oil pipelines with satellites. It is a messaging protocol that provides asynchronous communication between parties. An asynchronous messaging protocol decouples the message sender and receiver in both ... Read More

12K+ Views
I2C stands for the inter-integrated controller. This is a serial communication protocol that can connect low-speed devices. It is a master-slave communication in which we can connect and control multiple slaves from a single master. In this, each slave device has a specific address.The I2C is developed to overcome the complexities of transmitting data through other communication protocols, including Universal Asynchronous Receiver Transmitter (UART) and Serial Peripheral Interface (SPI).UART is an asynchronous transmission protocol. It is a device using them that should agree ahead of time on a data cost. The clocks of the machines should also have clocks with ... Read More

2K+ Views
Windows NT was produced by Microsoft in July 1993. Its 1st version was Windows NT 31 and windows 31 advanced server. It is processor independent multiprocessing, multiuser and component based on 2000.FeaturesThere are various features of Windows NT, which are as follows −It implements pre-emptive multitasking and multithreading operations.It supports multiple CPU systems with SMP (Symmetric Multiprocessing technology).Its security meets the US Department of Defence’s C2 standard.The NT system is a popular network operating system because of its low price, strong application service capability, high performance, and rich software.It supports various hardware platforms such as CISI (Intel system) and RISC ... Read More

1K+ Views
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic such as viruses and hackers.There are various types of firewalls in a computer network, which are as follows −Packet Filtering FirewallsA packet filtering firewall is an essential type of firewall. It facilitates a management program that monitors web traffic and filters incoming packets based on configured security methods.These ... Read More

2K+ Views
A firewall is a network security tool that monitors incoming and outgoing network traffic and determines whether to allow or block definite traffic based on a defined collection of security rules.The primary purpose is to enable non-threatening traffic and avoid malicious or unwanted data traffic for protecting the system from viruses and attacks. A firewall is a cybersecurity device that filters network traffic and supports users to block malicious software from creating the Internet in infected computers.Software vs Hardware FirewallsFirewalls can be hardware or software. In addition to reducing access to a protected device and network, a firewall can chunk ... Read More

2K+ Views
VLAN stands for Virtual LAN. It is a logical grouping of network devices. When we create VLAN, we break the large broadcast domain into smaller broadcast domains. Consider VLAN as a subnet. The same as two different subnets cannot communicate without a router, and different VLANs also require the router to transmit.FeaturesThere are various features of VLAN, which are as follows −Virtual LANs offer structure for creating groups of devices, even if their networks are different.It can raise the broadcast domains possible in a LAN.VLANs can be performing VLANs reduces the security risks as the number of hosts connected to ... Read More