- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1627 Articles for Computer Network
8K+ Views
UMA and NUMA are shared memory models. Multiprocessors are divided among these type of categories. In UMA, Uniform Memory Access, a single memory controller is used and it is applicable for general purpose applications and time sharing applications. In NUMA, Non-Uniform Memory Access, multi memory controllers are used. NUMA is suitable for real-time applications and time critical applications.Following are the important differences between UMA and NUMA.Sr. No.KeyUMANUMA1DefinitionUMA stands for Uniform Memory Access.NUMA stands for Non Uniform Memory Access.2Memory ControllerUMA has single memory controller.NUMA has multiple memory controllers.3Memory AccessUMA memory access is slow.NUMA memory accsss is faster than UMA memory.4BandwidthUMA has ... Read More
7K+ Views
In case of a computer system, memory is one of the most important parts of the system. Computer memory is entirely responsible for storing data, information, instructions, etc. in the system and it also defines the performance of the system. There are several types of computer memories available. But in this article, we only discuss about cache memory and virtual memory, and the important differences between them. What is Virtual Memory? Virtual Memory is a technique to increase the main memory capacity. It uses data swap technology and hard disk area is used as virtual memory. As its name ... Read More
71K+ Views
In computer systems, memory is a hardware component of the system that stores data and information in the computer. The computer memory can be classified into two main types namely – primary memory and secondary memory. The primary memory is further divided into two main types – RAM and ROM. Read through this article to find out more about RAM and ROM and how they are different from each other. Let's start with some basics of RAM and ROM. What is RAM? RAM stands for Random Access Memory. RAM is a type of primary memory of a computer system. ... Read More
17K+ Views
Hubs are basic network devices that operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Switches, on the other hand, function at the Data Link Layer to connect several devices in a network. Switches are mostly utilized to transmit data packets between various network devices such as routers and servers.Read through this article to find out more about hubs and switches and how they are different from each other.What is a Switch?A switch is essentially a piece of hardware or a device responsible for ... Read More
2K+ Views
Both Routers and Modems are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet, whereas Modems connect a device like desktop, laptop to the Internet. Routers connect devices across multiple networks. Read through this article to find out more about Routers and Modems and how they are different from each other. What is a Modem? A modulator-demodulator, or a modem, is a piece of hardware that transforms data from a digital format designed for direct communication between devices using specific cabling into a format suitable for transmission via ... Read More
12K+ Views
Both Routers and Bridges are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet, whereas Bridges connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about routers and bridges and how they are different from each other. What is a Router? A router is a networking device that receives, processes, and sends data packets from one computer network to another. On the Internet, routers are in charge of traffic steering. Data packets are used to send data across ... Read More
40K+ Views
Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ... Read More
5K+ Views
Stop and Wait protocol is a protocol for flow control mechanism. In this protocol, the sender sends one frame at a time and waits for acknowledgment from the receiver. Once acknowledged, the sender sends another frame to the receiver. Stop and Wait protocol is also a protocol for flow control mechanism. In this protocol, the sender sends multiple frames at a time and retransmits the frames which are found to be corrupted or damaged. Read through this article to find out more about these two protocols and how they are different from each other. What is Stop and Wait ... Read More
13K+ Views
WiFi and WiMax are used to create wireless network connections. WiFi is used to create small networks and used to connect printers, computers, gaming consoles, whereas WiMax uses spectrum to deliver connection to network. WiMax is used to provide Internet services such as Mobile Data and hotspots. Go through this article to find out more about the features of WiFi and WiMax and how they are different from each other. What is WiFi? WiFi (Wireless Fidelity) is a combination of wireless network protocols based on the IEEE 802.11 family of standards that are widely used for device networking and Internet ... Read More
7K+ Views
The process of turning plain text into an encrypted form (cipher text) is known as encryption. Sensitive data is transmitted in an encrypted form so that it can be protected and a strong encryption mechanism ensures that the data is not misused even if a hacker gets hold of it. Decryption is the reverse mechanism where the encrypted cipher text is converted back into its original form.Read through this article to find out more about encryption and decryption and how they are different from each other.What is Encryption?Encryption is the procedure of encoding data in cryptography. This procedure turns plaintext, ... Read More
To Continue Learning Please Login
Login with Google