- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 157 Articles for Networking
93 Views
Let us understand the concepts of Wasabi and ZumoDrive before learning the differences between them.WasabiWasabi is a hot cloud storage company. It delivers fast, low-cost, and reliable cloud storage. Generally, the Wasabi Hot Cloud Storage is 1/5 the price of Amazon S3 and faster than the competition with no fees for API requests.Wasabi Cloud Storage where one size fits all cloud object storage service which satisfies all storage performance requirements. Generally the Hot cloud storage costs less than cold storage service and is faster than traditional frequent-access storage services.ApplicationsThe applications of Wasabi are as follows −Web and mobile appsAgile development ... Read More
566 Views
Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ... Read More
294 Views
To begin with, let us learn the concepts of data protection and data privacy.Data ProtectionData protection is inclusive of the strategies that we can use to secure the privacy, availability, and integrity of our data. It is also called data security or information privacy.Data protection is important for any organization which collects, handles, or stores sensitive data. This strategy can help prevent data loss, theft, or corruption and can help minimize damage caused by disaster.Data PrivacyData privacy is defined as only the authorised person can access the data. It is typically applied to personal health information (PHI), personally identifiable information ... Read More
2K+ Views
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMAp-persistent CSMAThe p-persistent CSMA is used whenever the channel has time slots so that the time slot duration is equal to or greater than the maximum propagation delay time. The p-persistence senses the channel whenever a station becomes ready to send.Suppose if the channel is busy, then the station has to wait till the next slot is available.The p-persistence transmits with a probability p when the channel is idle. With a probability q=1-p, the station has to wait for the beginning of the ... Read More
4K+ Views
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More
4K+ Views
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More
88 Views
Let us understand the concepts of Amazon S3 and MiMedia before learning about their differences.Amazon S3It is a database service offered by the Amazon Company as a repository for the internet. It provides quick access to data objects along with their storage along with security, performance reliability and at economical prices. S3 is a Simple Storage Service.FeaturesThe features of Amazon S3 are as follows −In order to access S3 Storage you need to have an AWS account.It offers a pay per use model where you need to pay for only the storage space which you have actually used.It can be ... Read More
280 Views
The Name Binding Protocol (NBP) allows you to bind a name to the internal storage address of the entity and register that mapping so that other entities can follow.An NBP name was displayed by the applications to the users and used addresses internally to locate entities. When we register the entity's name and address, NBP validates its uniqueness.Generally, an entity name consists of three fields, which are as follows −The object − Object field is used to identify the user of the system. Because of the applications this value is set to the owner name, where the user specifies with ... Read More
253 Views
Let us understand the concepts of Thunderbolt 2 and 3 respectively.Thunderbolt 2Thunderbolt 2 connector is a Mini DisplayPort connector developed by Apple. It allows a maximum throughput of 20 gigabits per second, whereas the original Thunderbolt port can deliver up to a maximum of 10 Gbps. It achieves over the USB 3.0 technology that has a maximum speed of only 5 Gbps.Given below is the image of thunderbolt 2 −Thunderbolt 3It is the latest and the fastest version of the Thunderbolt provides a maximum throughput of 40 gigabits per second. It was introduced in 2015, by Intel’s. It proves to ... Read More
4K+ Views
Transport layer security protocol is one of the security protocols which are designed to facilitate privacy and data security for communications over the Internet. The main use of TLS is to encrypt the communication between web applications and servers, like web browsers loading a website.TLS is used to encrypt other communications like email, messaging, and voice over IP (VoIP). TLS was proposed by the Internet Engineering Task Force (IETF), which is an international standards organization.ComponentsThe three main components that TLS accomplishes are as follows −Encryption − It is used to hide the data being transferred from third parties.Authentication − It ... Read More