Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Kiran Kumar Panigrahi
Page 27 of 32
Difference between File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP)
Both FTP and SFTP are file transfer protocols and they are used to transfer files from one system to another. FTP does not use any secure channel to transfer files, whereas SFTP uses SSH protocol to establish a control connection. SFTP is highly secure than FTP.Read through this article to find out more about FTP and SFTP and how they are different from each other.What is File Transfer Protocol (FTP)?FTP stands for File Transfer Protocol; it is a client/server protocol for sending files to and from a host computer. User names and passwords can be used to authenticate FTP.Some websites ...
Read MoreDifference between CSMA/CA and CSMA/CD
Both CSMA/CA and CSMA/CD are network protocols for transmission that operate in the Medium Access Control Layer, however there are significant differences in the way they operate. Read through this article to find out more about CSMA/CA and CSMA/CD and how they are different from each other.What is CSMA/CA?CSMA/CA is a network protocol for carrier transmission that stands for Carrier Sense Multiple Access with Collision Avoidance. It works in the same media access control layer as CSMA/CD. This protocol is effective before the collision.Algorithm of CSMA/CAThe algorithm of CSMA/CA is as follows −When a frame is ready, the transmitting station ...
Read MoreDifference Between Hub and Bridge
Both Hubs and Bridges are network connecting devices and both of them broadcast data to every node on a network. Hubs operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Bridges connect various devices in a network.A bridge operates at the data link layer to connect multiple networks. It can read the outmost section of a data packet to tell where the message is going. A bridge can be programmed to reject packets from a particular network, so it can be used to reduce ...
Read MoreDifference between Spoofing and Phishing
Spoofing is an identity theft where a person tries to use the identity of a legitimate user. Phishing, on the other hand, is a phenomenon where an attacker employs social engineering methods to steal sensitive and confidential information from a user. Spoofing and phishing are both forms of cyber-attacks aimed at tricking you into disclosing your personal information. Both methods will be used by a criminal to gain your user names, passwords, and maybe more. Despite the fact that their final aim is the same, their techniques are not. Read through this article to find out more ...
Read MoreDifference between Static Routing and Dynamic Routing
Static Routing or Non-Adaptive Routing follows user-defined routing. Here, the routing table is not changed until the network administrator changes it. Static Routing uses simple routing algorithms and provides more security than dynamic routing. Dynamic Routing or Adaptive Routing, as the name suggests, changes the routing table if there is any change in the network topology. During network change, dynamic routing sends a signal to router, recalculates the routes and sends the updated routing information. Read through this article to find out how Static Routing differs from Dynamic Routing. What is Static Routing? One of the essential techniques ...
Read MoreDifference between CDMA and LTE
Code Division Multiple Access (CDMA) is a protocol used for 2G and 3G communication. In CDMA, a channel carries all types of transmission simultaneously without division of bandwidth or time. Data from different stations is transmitted simultaneously using different code modulation.Long-Term Evolution (LTE) is a high-performance interface for cellular mobile communications. It supports high-speed networks and at present, it is the fastest network protocol for smartphones and mobile phones.Read through this article to find out more about CDMA and LTE and how they are different from each other.What is CDMA?CDMA uses a single channel to carry all signals at the ...
Read MoreWhat is the difference between Augmented Reality and Virtual Reality?
There are games, movies, and other forms of 3D content that you can explore to have AR and VR experience on your smartphones, PCs, tablets, and VR headsets. In many different industries including marketing, education, training, remote support, exercising, remote diagnosis of illness, gaming, and entertainment, companies and developers are using Augmented Reality (AR), Virtual Reality (VR), or both. On the other hand, there are those who might not know which path to take. This guide will help you decide between the two by providing a side-by-side comparison of both. What is Virtual Reality? A computer-generated simulation of an alternative ...
Read MoreDifference between Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) cables.
Unshielded Twisted Pair or UTP are twisted pair cables that are used to transmit both data and voice, as their frequency range is suitable for transmission. UTPs are more cost-effective and are not needed to be grounded. Shielded Twisted Pair or STP are also a twisted pair cables but are required to be grounded, wants more maintenance, have high data transmission capacity and are costlier than UTP. Read through this article to find out more about UTP and STP cables and how they are different from each other. What are Shielded Twisted Pair (STP) Cables? IBM invented shielded twisted pair ...
Read MoreDifference between Token Bus Network and Token Ring Network
A Token Bus Network is a network protocol used to transmit data. In a Token Bus Network, a virtual ring is formed between nodes/stations and token is transferred from one station to another in a sequential manner. Each node in a Token Bus Network knows the address of its successor and predecessor and can transmit data if it has the token. A Token Ring Network is similar to a Token Bus Network but it works around the physical ring instead of a virtual ring. A token is passed from one node to another in a sequential manner and each node ...
Read MoreDifference between SMTP and POP3
SMTP and POP3 are message protocols which are required for sending and receiving the messages between the mail servers. In this article, we are going to compare and contrast the various features of SMTP and POP3 based on the tasks for which these two protocols have been designed. What is SMTP? The Simple Mail Transfer Protocol (SMTP) is an Internet communication protocol for sending and receiving electronic mail. SMTP is used to transmit and receive mail messages by mail servers and other message transfer agents. User-level email clients usually utilize SMTP exclusively to transmit messages to a mail server for ...
Read More