- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 826 Articles for Network
136 Views
Introduction For the past few years, generative models have attracted a lot of attention in the deep learning community. Among these, Adversarial Autoencoders (AAEs) and Generative Adversarial Networks (GANs) are two of the most well-liked models for producing realistic images. While AAEs are more adapted to producing various images that accurately capture the core of the training data, GANs are better suited to producing high-quality images that closely resemble the training data. We will talk about choosing GAN and AAE models for problems involving image generation in this article. Generative Adversarial Network (GAN) Ian Goodfellow introduced generative adversarial networks (GANs) ... Read More
227 Views
PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) are two VPN protocols that are used to establish secure and private internet connections. While both protocols accomplish the same objective, they differ significantly in terms of security, compatibility, and speed. L2TP is a more modern and safe protocol that uses stronger encryption methods and is more vulnerable to attacks. PPTP is a VPN protocol developed by Microsoft that is commonly used for establishing secure and private internet connections. Read this article to find out more about PPTP and L2TP and how they are different from each other. What is PPTP? ... Read More
147 Views
Intranet and Portal are both used within organizations to help organize and share information, but they differ significantly. An Intranet is a private network that only employees within a company can access. A Portal is a web-based platform that allows access to numerous types of information and services. Read this article to find out more about Intranet and Portal and how they are different from each other. What is Intranet? An intranet is a private network that allows employees within a company to share information and resources. It is an efficient and secure way to facilitate internal communication and cooperation, ... Read More
175 Views
AT&T offers two types of internet services: DSL (digital subscriber line) and U-Verse. DSL is an older technology that uses existing telephone lines to provide internet connectivity, whereas U-Verse is a newer technology that delivers internet, TV, and phone services through fibre optic cables. Read this article to find out more about DSL and U-Verse and how they are different from each other. What is DSL? DSL is an abbreviation for Digital Subscriber Line, a technology that delivers high-speed internet access over existing telephone lines. DSL technology divides the available frequencies on a telephone line into separate channels, one for ... Read More
323 Views
The terms ACL (Access Control List) and IDEA (International Data Encryption Algorithm) are frequently used in computer networking and cryptography. ACL is a technique for controlling resource access, whereas IDEA is an encryption algorithm for data security. Read this article to find out more about ACL and IDEA and how they are different from each other. What is ACL? ACL is a security mechanism that controls network resource access. It is a collection of permissions attached to an object, such as a file or a network share, that determines which people or groups can access the object and to what extent. ... Read More
1K+ Views
In digital communication, Delta Modulation and Differential Pulse Code Modulation are the techniques with fixed step size and it has updated ones with varying step size as Adaptive DM and DPCM. The Correlation between the current sample and a predicted value is quantized for both approaches to function. The main distinction between the two is that while DPCM sends multiple bits per sample, DM only sends one bit per sample. DM is a less complex approach than DPCM, but it also has a worse signal−to−noise ratio. What is Delta Modulation (DM)? It follows a linear type and the circuits of ... Read More
490 Views
Open System Interconnection (OSI) model consists of seven major layers. The layer−2 of the OSI stack and the switches working in this layer is layer−2 switch. Similarly, the third layer of this model is called the network layer and the switches working in this layer is layer−3 switch. Initially, Local Area Network uses hubs as a central devices connected to other devices. Later bridges were introduced but had less number of ports and then only switches were developed which includes more ports. What is a Layer−2 switch? The Layer−2 switches are the physical component of the network, in these, the ... Read More
390 Views
In this article, we will understand the concept of Kerberos and Radius and the difference between them. The three main components of Kerberos are the computer that contains the database, the ticket−granting server, and the authentication server. RADIUS does not store data in a specific format but rather talks with a central database. Kerberos is used to verify the identity of users and services before allowing them to access sensitive information. The verification methods used by the application layer protocols of Kerberos are ticket−based encryption methods. What is Kerberos? Kerberos comes under the application layer which is the topmost layer ... Read More
1K+ Views
In Data Communication, the data are transferred from the client to the receiver. During this transmission, there may be a chance of an error occurring due to network problems, interference and using any other ways. So, the error needs to be detected and corrected. For both error detection and correction, we can use various methods like linear code and Convolution code. Linear codes are efficient one for error correction of the transmission bits between the hosts, while convolution code encodes in a timely fashion. What is Linear Code? Block code is the one that encodes data within the block and ... Read More
272 Views
A network contains several groups of devices that communicate with one another through links. Devices are represented as hosts that are connected through switches, routers, hubs, modems, and access points with transmission mediums for communication purposes. Communication protocol specifies set of rules for exchanging data over a suitable network. Each protocol differs in its communication properties and can be connection−oriented or connection−less with a circuit or packet−switching techniques. Most of the common protocols used in networking are IEEE 802, Ethernet, Wireless LAN, SDH, ATM, Routing, etc. Here Ethernet and Synchronous Digital Hierarchy (SDH) are types of communication protocols used in ... Read More