
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 784 Articles for Network

6K+ Views
Both URL and Domain Name are two very common terms related to the Internet or web address. Sometimes, these are used interchangeably, but they are entirely different from each other. URL (Uniform Resource Locator) is the complete address of a web resource such as a webpage, whereas the Domain Name is the part of a URL that represents an IP address in a human friendly form. Read this article to find out more about URL and Domain Name and how they are different from each other. What is URL? A URL is a complete Internet address of a web ... Read More

1K+ Views
Both these terms "cybersecurity" and "network security" are related to security measures that organizations employ to protect their data, systems, and network infrastructure from online threats. However, cybersecurity is used in a much broader sense, while network security is a subset of cybersecurity. Read through this article to find out more about cybersecurity and network security and how they are different from each other.What is Cybersecurity?Cyber security refers to the use of technology, methods, and policies to reduce the danger of cyber-attacks while also protecting the systems, networks, programs, devices, and data from unwanted access.The field of cybersecurity is becoming ... Read More

43K+ Views
In computers, an address is used to identify a location in the computer memory. In operating systems, there are two types of addresses, namely, logical address and physical address. A logical address is the virtual address that is generated by the CPU. A user can view the logical address of a computer program. On the other hand, a physical address is one that represents a location in the computer memory. A user cannot view the physical address of a program. Read this article to find out more about logical and physical address and how they are different from each other. ... Read More

4K+ Views
In this post, we will understand the difference between RPC and RMI −RPC (Remote Procedure Call)It is a library.It is an OS dependent platform.It supports procedural programming.It is less efficient in comparison to RMI.It creates more overhead.The parameters passed to RPC is normal data.It is the older version of RMI.It is easy to program in RPC.It doesn’t provide any security.The cost of development is high.Versioning is a complicated process in RPC.Multiple codes will be needed to build a simple application in RPC.RMI (Remote Method Invocation)It is a platform based on Java.It supports object-oriented programming.It is more efficient in comparison to ... Read More

22K+ Views
A program is a passive entity that has a set of codes and instructions required to accomplish a task. A process, on the other hand, is an active entity of a program that is started with the execution of the program. Thus, the process is started by the program, once it is executed. The instructions of the program are then executed by the process. Read through this article to find out more about programs and processes and how they are different from each other. What is a Program? A program is a set of instruction codes that has been designed ... Read More

14K+ Views
DefinitionIn computer science and mathematics, a directed acyclic graph (DAG) refers to a directed graph which has no directed cycles.ExplanationIn graph theory, a graph refers to a set of vertices which are connected by lines called edges. In a directed graph or a digraph, each edge is associated with a direction from a start vertex to an end vertex. If we traverse along the direction of the edges and we find that no closed loops are formed along any path, we say that there are no directed cycles. The graph formed is a directed acyclic graph.A DAG is always topologically ... Read More

2K+ Views
Flooding and fixed routing are methods to transmit data packets from the source to the destination through a number of intermediate routers connected by transmission lines.Flooding is a non-adaptive routing technique following this simple method − when a data packet arrives at a router, it is sent to all the outgoing links except the one it has arrived on.Fixed routing algorithm is a procedure that lays down a fixed route or path to transfer data packets from source to the destination. The route is a mathematically computed best path, i.e. “least–cost path” that the packet can be routed through. The ... Read More

6K+ Views
Routing Algorithms − A routing algorithm is a procedure that lays down the route or path to transfer data packets from source to the destination. There can be many paths from the source to the destination; routing algorithm mathematically computes the best path, i.e. “least – cost path”. Routing algorithms are broadly classified into adaptive and non-adaptive routing algorithms.Adaptive Routing Algorithms − Also known as dynamic routing algorithms, they makes routing decisions dynamically depending on the network conditions. It constructs the routing table depending upon the network traffic and topology.Non-Adaptive Routing Algorithms − Also known as static routing algorithms, they ... Read More

7K+ Views
DefinitionSink trees of a given node in a computer network is a tree formed by connecting the node with all the other nodes of in the network with the optimal path, or more precisely the shortest path. Or, in other words, a sink tree is a minimal cost tree formed with the given node as the destination and all other nodes as sources. A popular measure for the path or the cost is the number of hops.ExplanationThe sink tree follows from the optimality principle. According to it, in a network of routers for data transmission, if a router ‘J’ lies ... Read More

8K+ Views
Adaptive routing algorithms, also known as dynamic routing algorithms, makes routing decisions dynamically while transferring data packets from the source to the destination. These algorithms constructs routing tables depending on the network conditions like network traffic and topology. They try to compute computes the best path, i.e. “least – cost path”, depending upon the hop count, transit time and distance.Types of Adaptive Routing AlgorithmsThe three popular types of adaptive routing algorithms are shown in the following diagram −Centralized algorithm − In centralized routing, one centralized node has the total network information and takes the routing decisions. It finds the least-cost ... Read More