Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Page 40 of 94
Difference between Amazon Drive and Box
With the latest development in Information Technology, we found some new ways to store data which tremendously decreased the cost. It is quite astounding to think that we have moved on from Punched Cards to Clouds in such a brief period. Of course, the exponential growth in the IT sector helped this to make a reality. At the same time, as more and more cloud services are appearing in the market, it is becoming quite tiresome to find the best service out there. In this article, we will differentiate two cloud services, namely, Amazon Drive and Box.Amazon DriveAmazon Drive is ...
Read MoreDifference between Cloud Computing and Virtualization
What is Virtualization?Virtualization is a method of creating computer-generated replicas of servers, apps, data centres, and other forms of hardware that operate identically to their actual counterparts using the software.Virtualization software uses a thin layer of software called a "hypervisor, " which enables a single computer to host many virtual machines (VMs).Virtual machines (VMs) are software containers that run their own operating systems and act like standalone computers, although only using a small portion of the underlying hardware.For more efficient hardware utilisation, the hypervisor also assigns computing power to each VM as needed.Virtualization technology enables businesses to use a cloud-like ...
Read MoreCapacity of a channel in Computer Networks
What Does the Term "Channel Capacity" Imply?The maximum quantity of traffic or signal that may pass over a particular infrastructure channel is channel capacity. It can be used to assess the capacity of a channel or conduit in computer science, electrical engineering, and other areas.The apparent advantages of analyzing channel analysis have made this word a household term in the IT world. Engineers might be tasked with determining how much data can flow through a particular fiber-optic network or how much data can pass via a WAN with wired and wireless components. The difficulty of deciding channel capacity and the ...
Read MoreDifference between Dropbox and Backblaze B2
DropboxDropbox is a cloud storage file, synchronization, personal cloud, and client software provided by Dropbox, Inc. Dropbox is an American Corporation headquartered in San Francisco, California. It was created as a start-up company in 2007 by Drew Houston and Arash Ferdowsi, students from MIT. They work on practically all platforms, such as Windows, Mac OS, iOS, Android, and web browsers.The cloud service marketplace is projected to grow in popularity as individuals seek to access their digital information from several locations and devices. DropBox is credited with inventing the storage cloud concept, but it now faces competition.Following are some of the ...
Read MoreDifference between Amazon S3 and Mediafire
Amazon S3Amazon Simple Storage Service (Amazon S3) is a web-based cloud storage service that is scalable and fast. On March 14, 2006, AWS launched Amazon S3 in the United States, followed by Europe in November 2007.The service is intended for online data and application backup and archiving on Amazon Web Services (AWS). Amazon S3 was established with a small feature set in mind to make web-scale computing more accessible to developers.Amazon S3 can store any item, making it ideal for Internet application storage, backup and recovery, disaster recovery, data archives, analytics data lakes, and hybrid cloud storage.Amazon S3 may be ...
Read MoreAlias/Secondary IP Address
What is Alias/Secondary IP Address?IP aliasing is the process of assigning several IP addresses to a network interface. It allows a single node on a network to have many network connections, each having a different purpose.Multiple network addresses can be provided on a single physical interface using IP aliasing. One rationale for doing so could be to make a single computer appear to be several computers.How to configure?In Linux, to use IP aliasing, the Kernel must be compiled with network aliasing and IP options. Then the aliases would attach to the virtual network device or interface with a specific virtual ...
Read MoreRemote Direct Memory Access (RDMA)
What is RDMA?The access of one computer's memory by another in a network without the involvement of any computer's operating system, processor, or cache is referred to as RDMA. Because many resources are freed up, it aids in improving system throughput and performance.On a remote machine, read and write operations can be performed without being interrupted by the CPU of that machine. The data transfer rate is increased, and networking latency is reduced, thanks to this technology. It uses zero-copy networking for transferring data directly into system buffers by enabling network adapters.RDMA was earlier used only in high-performance computing (HPC) ...
Read MoreWhat is Inter-Switch Link (ISL)?
Inter-Switch LinkISL is a VLAN protocol that stands for Inter-Switch Link. Cisco's ISL is a proprietary protocol that is only utilized between Cisco switches.A point-to-point VLAN context can support up to 1000 VLANs and is only compatible with Fast Ethernet and Gigabit Ethernet networks.ISL encapsulates an Ethernet frame with a header that sends VLAN IDs between switches and routers. The tag in IEEE 802.1Q is internal.An Ethernet encapsulated ISL frame will typically start at 94 bytes and grow to 1548 bytes in size. Encapsulation is used to develop the protocol.The frame is given a 26-byte header and a 4-byte CRC ...
Read MoreDenial-of-Service (DoS) Attack and its Types
What is a Denial-of-Service Attack?A Denial-of-Service (DoS) attack is an attack on a computer network that limits, restricts, or stops authorized users from accessing system resources.DoS attacks work by flooding the target with traffic or sending it data that causes it to crash. It deprives genuine users of the service or resources they expect to receive.DoS assaults frequently target high-profile corporations such as banks, commerce, media companies, and government and trade organizations' web servers.Even through DoS assaults seldom result in the theft or loss of critical information or other assets, they can take a lot of time and money to ...
Read MoreTCP/IP in Computer Networking
TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. TCP/IP is a suite of protocols used for the communication of devices on a network. The network can be of any type: Internet or personal networks like the intranet, extranet, etc.The modern developments that we use on the Internet are only possible because of the TCP/IP suite. Although the name suggests only two protocols, it contains other protocols in it. Let us look at the functioning of this suite in detail.Working of TCP/IPIn simple terms, TCP takes care of how data is transferred in a network.It breaks down ...
Read More