Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Ginni
Page 9 of 124
What is the I2C Protocol in Computer Network?
I2C (Inter-Integrated Circuit) is a serial communication protocol designed to connect low-speed devices in embedded systems and computer networks. It operates as a master-slave communication system where a single master can control multiple slave devices, with each slave having a unique address for identification. I2C was developed by Philips Semiconductor (now NXP) to overcome the complexities of other communication protocols like UART (Universal Asynchronous Receiver Transmitter) and SPI (Serial Peripheral Interface). Unlike UART, which requires devices to agree on data rates beforehand and maintain synchronized clocks, I2C provides a more flexible and efficient solution for device communication. ...
Read MoreWhat is the MQTT protocol in Computer Network ?
MQTT represents Message Queuing Telemetry Transport. It is a highly lightweight and publish-subscribe messaging transport protocol designed for constrained environments where bandwidth is limited and network reliability is uncertain. MQTT was initially invented and developed by IBM in the late 1990s to link sensors on oil pipelines with satellites. It provides asynchronous communication between parties, meaning the message sender and receiver are decoupled in both space and time, making it scalable in unreliable network environments. The protocol is ideal for collecting data from many devices and transporting that data to IT infrastructure, particularly in machine-to-machine (M2M) connections where ...
Read MoreWhat is a SPI Protocol in the Computer Network?
SPI (Serial Peripheral Interface) is a synchronous serial communication protocol designed for short-distance communication between microcontrollers and peripheral devices. Created by Motorola in the mid-1980s, SPI enables full-duplex data transfer where transmission and reception occur simultaneously. SPI operates on a master-slave architecture where one device (master) controls the communication and timing, while slave devices respond to the master's commands. Unlike I²C protocol, SPI lacks built-in device addressing, which makes it simpler for point-to-point connections but requires additional hardware for multiple slave configurations. SPI Interface and Signal Lines The SPI protocol uses four primary signal lines for communication: ...
Read MoreDifferentiate between I2C and SPI Protocol in Computer Network.
Both I2C and SPI are serial communication protocols used to connect microcontrollers with peripheral devices like sensors, memory chips, and displays. These protocols enable efficient data exchange in embedded systems and computer networks. I2C Protocol I2C (Inter-Integrated Circuit) is a multi-master, multi-slave serial communication protocol developed by Philips. It uses only two wires to connect multiple devices on the same bus, making it ideal for applications where pin count and board space are limited. I2C Bus Architecture Master ...
Read MoreWhat is DAS in the Computer Network?
Direct Attached Storage (DAS) is a computer storage system that is directly connected to a single computer or server without going through a network. Unlike networked storage solutions, DAS provides dedicated storage access to one host system through a direct physical connection via a Host Bus Adapter (HBA). DAS represents the most traditional form of computer storage, where storage devices like hard drives, SSDs, or external drive arrays are physically attached to the computer that uses them. This direct connection eliminates network overhead and provides fast, dedicated access to stored data. Direct Attached Storage ...
Read MoreWhat is iSCSI in the Computer Network?
iSCSI represents Internet Small Computer Systems Interface. It is a transport layer protocol that works on top of the Transport Control Protocol (TCP). It enables block-level SCSI data transport between the iSCSI initiator and the storage target over TCP/IP networks. iSCSI supports encrypting the network packets and decrypts upon arrival at the target. There are multiple means of transports that can be used for iSCSI. The most common is TCP/IP over Ethernet, but Remote Direct Memory Access (RDMA) can also be used with iSER, which is iSCSI Extensions for RDMA. If using iSER, the transport is RoCE or InfiniBand, ...
Read MoreDifferentiate between CIFS and NFS in Computer Network.
CIFS (Common Internet File System) and NFS (Network File System) are two prominent network protocols used for file sharing across networks. While both enable remote file access, they differ significantly in their design, implementation, and target operating systems. CIFS CIFS stands for Common Internet File System, also known as Server Message Block (SMB). It is a network protocol primarily designed for sharing files and resources on a Local Area Network (LAN). CIFS allows users to manipulate remote files as if they were stored locally on their computer. The protocol supports standard file operations including read, write, create, ...
Read MoreWhat is GSM in the Computer Network?
GSM stands for Global System for Mobile Communication. It is a widely used digital cellular technology developed at Bell Laboratories in 1970 for transmitting mobile voice and data services. GSM operates at multiple frequency bands including 850MHz, 900MHz, 1800MHz, and 1900MHz. GSM is an open and digital cellular standard that enables mobile communication through a network of base stations and mobile switching centers. One of its key features is the ability to roam and switch carriers using individual mobile units when compatible partner networks are available. GSM Network Architecture GSM networks utilize different cell sizes to provide ...
Read MoreWhat are the Token Ring Frame Formats in Computer Network?
There are three types of frame formats supported on a Token Ring network: token, abort, and data/command frame. The token format is the mechanism by which access to the ring is passed from one computer to another on the network. The token format consists of three bytes, where the starting and ending delimiters indicate the beginning and end of a token frame. The middle byte is an access control byte that contains priority bits, reservation bits, a token bit, and a monitor bit. Token Ring Frame Formats ...
Read MoreWhat is IGMP in the Computer Network?
Internet Group Management Protocol (IGMP) is a network layer protocol used to manage multicast group memberships in IPv4 networks. IGMP allows devices to join multicast groups and enables routers to efficiently distribute multicast traffic only to networks that have interested receivers. Unlike multicast routing protocols that determine paths for multicast traffic, IGMP focuses solely on group membership management. It provides multicast routers with information about which hosts on their directly connected networks want to receive traffic for specific multicast groups. How IGMP Works IGMP operates locally between hosts and their directly connected multicast routers. Each multicast router ...
Read More