Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Bhanu Priya
Page 33 of 106
What is a Distributed Component Object Model (DCOM)?
DCOM is an extension of the Component Object Model (COM). Component Object Model explains how components and their clients interact. This interaction is the way the client and the component can connect without the need of any intermediary system component.Suppose when client and component are present on different machines, DCOM replaces the local Inter-process communication with a network protocol.Neither the client nor the components are aware that the wire that connects them has just become a little longer.The COM run-time provides object-oriented services to clients and components and uses RPC and the security provider to generate standard network packets that ...
Read MoreDifferentiate between Zoom, Google Meet and Cisco Webex.
Let us see the difference between Zoom vs Google Meet vs Webex by comparing their installations, features, strengths and weaknesses.ZoomThe installation requirements for Zoom are as follows −An internet connection (wired/wireless) with a minimum of 600 kbps (up/down) for 1:1 calling and 1 mbps (up/down) for group calling.Speakers and microphone (external or internal or even over Bluetooth).A webcam (built-in or USB plug-in)An internet browser or the zoom applicationA minimum of a single core 1Ghz processor or a dual core processor with 4GB of RAMFeaturesThe features of Zoom are as follows −Built-in tools for screen-sharingSupport for up to 1000 participants and ...
Read MoreWhat is early token release and delayed token release?
Token ring is a physical unidirectional ring, where the systems are connected to the ring through some interface.In the token ring a special frame is called a token which is always circulated on the ring. If a system has to transmit then it needs to acquire the token without a token no system can transmit. Only one system can transmit at a time. Hence it is collision free protocol.The token ring source is responsible for removing the frame from the ring. In normal token ring operation, a station sending information holds the token until the sending data circles the entire ...
Read MoreWhat is a Network and process of Network Communications?
Network is a connection of two or more systems which are used to share resources and information.Network CommunicationFlow of information among the group of members is a communication network. Network helps managers to establish contacts in different patterns through communication flows.The network depends on the magnitude of the organisation, nature of communication channels in the organisation and the number of persons involved in the process. There can be many patterns of communication networks.Function of Communication devicesThe functions of communication networks include the following −It is the way of coordinating the activities of individuals, relationships, groups and other sub-units within the ...
Read MoreWhat is DHCP snooping?
Dynamic Host Configuration Protocol (DHCP) is a network management protocol which is used to automate the process of configuring devices on IP networks. Therefore it allows them to use network services like DNS, NTP or any other communication protocol based on UDP or TCP.DHCP snoopingDHCP snooping is a series of techniques in computer networking, which are applied for improving the security of a DHCP infrastructure.When DHCP servicers are allocating IP addresses to the client on the LAN, DHCP snooping can be configured on LAN switches in order to prevent malicious or malformed DHCP traffic, or rogue DHCP servers.Apart from that, ...
Read MoreDifferentiate between Component and Object.
Let us learn the concept of object and component.ObjectIt is defined as a concept, thing or abstract with meaning.FeaturesThe features associated with object are as follows −StateOperationAttributesRepresent something realProvides an abstractionSelf-containedClearly defined.ComponentIt can be defined as a collection of objects which provides a set of services to other systems.For example − components include code which provides graphic facilities, network services, and a search set of tables in the database.A component is a self-contained entity which provides functionality to its environment and also imports functionality from its environment using well defined and open interfaces.The components that differ from objects are as ...
Read MoreWhat are the differences between Firewall and Proxy Server?
To begin with, let us learn the concepts of firewall and proxy server.FirewallIt is used to provide security, mostly from external networks such as the Internet. It is the combination of software and hardware to allow, deny, monitor, and block any and all data transmissions occurring from a specified internal network.Firewalls evaluate, allow, or deny network traffic based on certain predefined rules set-up based on IP addresses or its range, port numbers, protocols, and few other factors. It provides good traffic management.Firewalls defend against external threats refusing or denying unauthorized requests, transmissions, and connections to the router, network, application software, ...
Read MoreWhat are the differences between AMQP and HTTP?
Let us begin by understanding the concepts of advanced message queuing protocol (AMQP) and HyperText Transfer Protocol (HTTP)AMQPAdvanced message queuing protocol (AMQP) is a message protocol that deals with publishers and consumers. The publishers produce the message whereas the consumer picks the message and processes it.Given below is the pictorial representation of AMQP −This protocol is used in client-server messaging and in IOT device management. It allows the messages to be passed between applications.AMQP is a new standard design to meet financial institutions and it enables the interoperation, sharing which allows business to work together in a wide infrastructure.AMQP secure ...
Read MoreWhat are the differences between QR code and NFC?
Let us understand the concepts of QR code and Near Field Communication (NFC).QR CodesQR code is called "Quick Response", it allows us to encode or store over 4500 characters in a two-dimensional bar code.These codes are the "square barcodes" that were initially developed and used in Japan.The main aim of the QR code is to store the information in such a way that the machine (scanner) can be able to read the data present in the code.Uses of QR codesQR codes can be used for storing data like −Simple textPhone numbersOnline conferences via zoom appOnline one time passwords(OTP)Online accounts authentication ...
Read MoreWhat is Netcat?
Netcat is a networking utility with the help of TCP/IP protocol which reads and writes data across network connections. Netcat is built as a secure back-end tool and can be used to send files from a client to a server and back directly with other programmes and scripts.At the same time, it's a network debugging and exploration platform rich in features that can define network parameters while also creating a tunnel connection to a remote host.Although Netcat can do many things, its primary objective and most desirable features are as follows −To build a connection from the server to the ...
Read More