Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Differences Articles - Page 188 of 191
44K+ Views
Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ... Read More
147K+ Views
Both BFS and DFS are types of graph traversal algorithms, but they are different from each other. BFS or Breadth First Search starts from the top node in the graph and travels down until it reaches the root node. On the other hand, DFS or Depth First Search starts from the top node and follows a path to reaches the end node of the path. Read this article to learn more about these two graph traversal algorithms and how they are different from each other. What is BFS? Breadth First Search (BFS) algorithm traverses a graph in a breadth-ward motion ... Read More
16K+ Views
Active and Passive Attacks are security attacks that jeopardize the security of a system. Security attacks are basically the unauthorized actions that that are taken to destroy, change, or steal the sensitive information and data from the system. In an Active attack, an attacker tries to modify the content of the messages. On the other hand, in a Passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. Read this article to find out more about Active and Passive attacks and how they are different from each other. Let's start with some basics of ... Read More
8K+ Views
Stop and Wait protocol is a protocol for flow control mechanism. In this protocol, the sender sends one frame at a time and waits for acknowledgment from the receiver. Once acknowledged, the sender sends another frame to the receiver. Stop and Wait protocol is also a protocol for flow control mechanism. In this protocol, the sender sends multiple frames at a time and retransmits the frames which are found to be corrupted or damaged. Read through this article to find out more about these two protocols and how they are different from each other. What is Stop and Wait ... Read More
17K+ Views
WiFi and WiMax are used to create wireless network connections. WiFi is used to create small networks and used to connect printers, computers, gaming consoles, whereas WiMax uses spectrum to deliver connection to network. WiMax is used to provide Internet services such as Mobile Data and hotspots. Go through this article to find out more about the features of WiFi and WiMax and how they are different from each other. What is WiFi? WiFi (Wireless Fidelity) is a combination of wireless network protocols based on the IEEE 802.11 family of standards that are widely used for device networking and Internet ... Read More
11K+ Views
The process of turning plain text into an encrypted form (cipher text) is known as encryption. Sensitive data is transmitted in an encrypted form so that it can be protected and a strong encryption mechanism ensures that the data is not misused even if a hacker gets hold of it. Decryption is the reverse mechanism where the encrypted cipher text is converted back into its original form.Read through this article to find out more about encryption and decryption and how they are different from each other.What is Encryption?Encryption is the procedure of encoding data in cryptography. This procedure turns plaintext, ... Read More
10K+ Views
Both MAC Address and IP Address are used to uniquely identify a machine on the internet. MAC address is provided by the chip maker while IP Address is provided by the Internet Service Provider. Mac Address Media Access Control (MAC) address is a physical address that works at the data link layer of the OSI model. A MAC address is a 48 or 64-bit address associated with a network adapter. MAC addresses are linked to the hardware of the network adapters, hence they are also known as the "hardware address" or "physical address." MAC addresses uniquely identify the adapter ... Read More
5K+ Views
Connection-oriented and Connection-less Services are used to establish connections between two or more devices. Connection-oriented Services A connection-oriented service is one that establishes a dedicated connection between the communicating entities before data communication commences. It is modeled after the telephone system. To use a connection-oriented service, the user first establishes a connection, uses it and then releases it. In connection-oriented services, the data streams/packets are delivered to the receiver in the same order in which they have been sent by the sender. Connection-oriented services may be done in either of the following ways − Circuit-switched connection: In circuit ... Read More
27K+ Views
When several computers are connected together and are able to communicate with one another, it is called a computer network. Computer networks are designed to share data and information among the computers of the network. Depending on the operating geographical area, computer networks are of the three major types, namely LAN, MAN, and WAN. All the three computer networks are designed for the same purpose, i.e., for sharing information among the computers. But, they are different in many ways, which we are going to highlight in this article. Let's start with some basics of LAN, MAN, and WAN. What ... Read More
4K+ Views
A WAN in general is a network of local area networks (LANs) that link to other LANs via telephone lines and radio waves. WAN connections can include both wired and wireless technologies. Wired WAN services include carrier Ethernet, commercial broadband Internet links, etc., whereas wireless WAN technologies include cellular data networks like 4G LTE, public Wi-Fi, satellite networks.LANs are privately owned and span a smaller geographical area (restricted to a few kilometers). It can be used in various settings, including offices, residences, hospitals, and schools. The setup and management of a LAN is quite straightforward.Go through this article to find ... Read More