
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

10K+ Views
Wireless sensor networks (WSNs) have the power of distributed communication, computing, and sensing features. They are characterized as infrastructure less, fault tolerant and self-organizing networks which provide opportunities for low-cost, easy-to-apply, rapid and flexible installations in an environment for various applicationsThe wireless sensor and the sensor node architecture are given in the diagram below −Characteristics of WSNThe characteristics of WSN are as follows −Resource constraints − Nodes of WSN are smaller in size and get power from the batteries. It justifies that service provided by the nodes like communication and computation amount of memory is very limited.Communication paradigm − The ... Read More

18K+ Views
Local Area networks are of two types − Peer to Peer network and client server network.Let us discuss about client server network −Client/Server NetworkIn client-server network relationships, certain computers act as servers and others act as clients.A server is simply a computer that provides the network resources and provides service to other computers when they request it. A client is the computer running a program that requests the service from a server. Local area network (LAN) is based on client server network relationship.A client-server network is one on which all available network resources such as files, directories, applications and shared ... Read More

428 Views
TLS (Transport layer security) is the successor or the updated version of SSL and the basic process of securing the network by both is more or less the same.Transport Layer Security (TLS)/Secure Sockets Layer (SSL) are computer networking protocols for securing connections between network application clients and servers over an insecure network. These protocols provide a mechanism for encrypting and authenticating data sent between client and server.SSL/TLS layers are responsible for the transport of data between processes and the routing of network traffic over a network between client and server, and below application layer protocols such as Hypertext Transfer Protocol ... Read More

22K+ Views
Logic Link Control (LLC) Layer and Medium Access Control (MAC) layers are the sublayers of the Data link layer in the OSI reference model.OSI reference model: It stands as Open Systems Interconnection. OSI is a 7 layer architecture which contains 7 layers. Each layer has its own specific functionality. All these 7 layers in the OSI model are used to transmit data.Data Link LayerIn computer networking, the data link layer is the 2nd layer of the OSI reference model. The main function of this layer is to transmit data between nodes. The data link layer transmits data between network entities ... Read More

40K+ Views
Modem stands for Modulator and Demodulator. It is a device that modulates signals to encode digital information for transmission and demodulates signals to decode the transmitted information.A modem transmits data in bits per second (bps).It is necessary for communication between digital devices and Analog devices.Modem is necessary because it acts as a translator between the devices and rapidly transmits the information.It converts the digital signal to Analog and vice versa to communicate between devices.It encodes the signal and decodes at the other end and vice versa between the devices.Building blocks of modem are shown in the diagram below −Types of ... Read More

557 Views
The network troubleshooting tools are useful for every network administrator. These tools can be used to troubleshoot different network conditions.The network troubleshooting tools which are most used are as follows −RouteThe route utility is helpful to display the status of the routing table on host. The route utility is limited at the situations where the host has one ip address with one gateway. The route plays a key role at multiple IP addresses and multiple gateways.pathping / mtrThe pathping and meter utilities take the information obtained from tools and provide a more detailed picture of the characteristic path from particular ... Read More

1K+ Views
IPSec is one of the secure techniques on the market for connecting network sites.IPSec was designed to supply the subsequent safety features once transferring packets across networks the following factors −Authentication − Verifies that the packet received is truly from the claimed sender.Integrity − Ensures that the contents of the packet didn't amend in transit.Confidentiality − Conceals the message content through secret writing.Use of Digital CertificateIt is explained below how IP security (IPsec) makes use of Digital Certificate.A digital certificate is an associate electronic document issued by a Certificate Authority (CA). It contains the general public key for a digital ... Read More

554 Views
Mostly in the digital age, an enterprise Software-defined Wide Area Network (SD-WAN) can modernise your network and propel your business, while a single centralised SD-WAN can unify network connectivity and allow application delivery to be coordinated across an entire network.A WAN is a link separated by a significant distance between local area networks (LANs), anything from a few miles to thousands of miles. The word software-defined means the WAN is designed and managed programmatically. Therefore, it can be easily modified to meet evolving needs rapidly.Given below is the diagram of SD-WAN −Features of SD-WANThere are some features commonly attributed to ... Read More

2K+ Views
Wide area network (WAN) is a telecommunication network that spreads over a large area of computer networking. A WAN network connects different small LAN and MAN networks.A well-known example of a WAN network is the Internet. It covers cities, states, countries and even continents. It can be a public network or a private network.WAN Network TechnologiesThere are two technologies which are used in the WAN network design. These technologies are explained below −Circuit SwitchingCircuit switched networks work on the principle of virtual connection that means all the messages will follow the same path and resources in this path are reserved ... Read More

8K+ Views
Transmission Control Protocol/Internet Protocol (TCP/IP) are two different communication protocols. TCP defines the communication in a network and how to send data in the form of packets. IP manages how to make the route for packets to make sure it reaches its defined destination. Before data is sent its IP address is checked then it is determined where to forward the data.TCP/IP uses the same model as the OSI model. It uses the client/server model type of communication where a user or machine (a client) is provided a service by another computer (a server) in the network.TCP/IP has four layers ... Read More