Computer Network Articles

Page 52 of 122

What is Storage Area Network (SAN) in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

SAN stands for Storage Area Network. This is a dedicated high-speed network that connects storage devices to multiple servers, providing a shared pool of storage resources. Each server can access SAN storage as if it were directly attached local storage, enabling centralized data management and improved storage utilization. A SAN consists of interconnected hosts, switches, and storage devices that communicate using specialized protocols. Fibre Channel (FC) is the most common transport protocol, offering high-speed, low-latency connections. Fibre Channel over Ethernet (FCoE) allows organizations to run FC traffic over existing Ethernet infrastructure, converging storage and IP networks. ...

Read More

Differentiate between DAS and SAN in Computer Network.

Ginni
Ginni
Updated on 16-Mar-2026 814 Views

Direct Attached Storage (DAS) and Storage Area Network (SAN) are two distinct storage architectures used in computer networks. Understanding their differences is crucial for selecting the appropriate storage solution based on organizational needs and budget considerations. Direct Attached Storage (DAS) DAS stands for Direct-attached storage. It is computer storage that is connected directly to one computer and not accessible to other systems on the network. The DAS system is attached directly to the computer through the HBA (Host Bus Adapter). Unlike network-attached storage devices, DAS connects directly to the server without requiring network infrastructure. Modern DAS systems ...

Read More

Differentiate between GSM and CDMA in Computer Network.

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

In mobile telecommunications, two major digital cellular technologies have dominated the market: GSM (Global System for Mobile Communication) and CDMA (Code Division Multiple Access). Both technologies enable mobile communication but use fundamentally different approaches for handling multiple users on the same network infrastructure. Understanding the differences between GSM and CDMA is crucial for network engineers and telecommunications professionals, as each technology offers distinct advantages in terms of security, flexibility, and network capacity. GSM (Global System for Mobile Communication) GSM is a digital mobile communication standard that operates as a second-generation (2G) cellular technology. It uses Time Division ...

Read More

What is the Windows 2000 Operating System in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 3K+ Views

Microsoft released Windows 2000 in February 2000 as a desktop operating system for X86 architecture. It represents a significant milestone in Microsoft's operating system evolution, combining the user-friendly features of Windows 98 with the stability and security of the Windows NT family. The operating system came in multiple editions including Windows 2000 Professional, Windows 2000 Server, and Windows 2000 Datacenter Server. Microsoft initially planned to develop a version for the Alpha architecture but discontinued those plans following an announcement by Compaq. System Requirements The minimum installation requirements for Windows 2000 include: Pentium processor 32MB RAM ...

Read More

Differentiate between IEEE 802.3 and IEEE 802.5 in Computer Network.

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

The IEEE 802.3 and IEEE 802.5 standards define two fundamentally different approaches to local area networking. IEEE 802.3 specifies Ethernet with collision detection, while IEEE 802.5 defines Token Ring with token-passing protocols. IEEE 802.3 Standard (Ethernet) The IEEE 802.3 standard is commonly known as Ethernet or CSMA/CD (Carrier Sense Multiple Access/Collision Detection). Originally developed by Xerox and later extended by DEC, Intel, and Xerox, Ethernet has become the dominant LAN technology worldwide. In Ethernet networks, stations use a "listen before transmit" approach. When a station needs to send data, it first listens to the medium. If the ...

Read More

What is Generic Routing Encapsulation (GRE)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 3K+ Views

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that enables encapsulation of a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network. GRE uses IP protocol number 47 and is defined by RFC 2784. GRE creates secure tunnels between network endpoints, allowing different private networks to communicate over public infrastructure like the Internet. It operates as a stateless protocol, meaning it doesn't maintain connection state information. How GRE Works GRE works by encapsulating the original packet (payload) within a new IP packet. The process involves: ...

Read More

Wireless Media Access Issues in Internet of Things

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 5K+ Views

The Internet of Things (IoT) is a network of interconnected physical devices embedded with sensors, software, and connectivity technologies that enable them to collect and exchange data over the internet. These "smart" devices range from simple sensors to complex industrial equipment. IoT systems rely heavily on wireless communication due to the mobility and distributed nature of connected devices. However, wireless media access presents unique challenges that significantly impact IoT network performance, energy efficiency, and reliability. Medium Access Control (MAC) in IoT The MAC protocol coordinates data transmission among multiple IoT devices sharing the same wireless medium. Unlike ...

Read More

What happens when we type a URL?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 625 Views

A Uniform Resource Locator (URL) is a web address that specifies the location of a web resource on a computer network and defines how to access it. URLs are most commonly used to reference web pages, but they can also point to files, email addresses, databases, and other network resources. A URL consists of several components: a protocol (like HTTP or HTTPS), a domain name, an optional port number, a path to the specific resource, and sometimes additional parameters or fragments. When you type a URL into your browser's address bar or click a hyperlink, a complex series of ...

Read More

Difference between USB Tethering and Mobile Hotspot

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 15K+ Views

USB Tethering and Mobile Hotspot are two methods for sharing a mobile device's internet connection with other devices. While both provide internet access, they differ significantly in their connection methods, performance characteristics, and use cases. USB tethering creates a direct connection between a mobile device and another device (typically a laptop) using a USB cable. In contrast, a mobile hotspot creates a wireless network that allows multiple devices to connect via Wi-Fi. USB Tethering and Mobile Hotspot: Key Differences No, USB tethering and mobile hotspot are not the same, though they serve similar purposes of sharing internet ...

Read More

Difference between OneDrive and SecureSafe

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 155 Views

OneDrive and SecureSafe are two distinct cloud storage services that cater to different user needs and security requirements. While OneDrive focuses on mainstream productivity and integration with Microsoft's ecosystem, SecureSafe emphasizes enhanced security features for users who prioritize data protection. OneDrive Microsoft OneDrive is a file hosting and synchronization service provided by Microsoft. It allows users to store files, personal information, and share content across multiple devices. OneDrive offers 5GB of free storage space to all users. Launched by Microsoft in 2007, OneDrive is widely used by professionals and individuals for storing work-related documents and personal files. ...

Read More
Showing 511–520 of 1,219 articles
« Prev 1 50 51 52 53 54 122 Next »
Advertisements