Found 1625 Articles for Computer Network

Difference between SSH and Telnet.

Kiran Kumar Panigrahi
Updated on 02-Dec-2022 06:01:36

14K+ Views

There are various application programs that we can use to access the resources of a remote machine. Telnet and SSH are the primary client server application programs that use remote terminal service which allows a user at one site to interact with a remote timesharing system at another site as if the user’s keyboard and a display is connected directly to the remote machine. Telnet and SSH both are Layer7 application layer protocols and both use TCP (Transmission Control Protocol) at the transport layer. In this article, we will discuss the important differences between SSH and Telnet. But before going ... Read More

Difference between Spooling and Buffering

Kiran Kumar Panigrahi
Updated on 07-Dec-2022 06:41:47

6K+ Views

Multitasking plays an important role in the context of defining the performance of a computer. Multitasking decides how processes are divided and performed by the CPU between different inputoutput subsystems. In order to process multiple tasks most efficiently, computer systems use various methods to schedule the tasks, speed up calculations and improve Web browsing among which Spooling and buffering are the primary methods. In this article, we will discuss the major differences between spooling and buffering. But before going into the differences, let's have a basic overview of spooling and buffering so that it will become easier to understand how ... Read More

QOS Traffic Scheduling

Moumita
Updated on 09-Jan-2020 10:19:23

3K+ Views

QoS traffic scheduling is a scheduling methodology of network traffic based upon QoS (Quality of Service). Here, the frames or packets are mapped to internal forwarding queues based on its QoS information, which are then services according to a queuing scheme.Typically, multiple queues are present each with different priority levels. The scheduler decides the type of treatment to be given to the traffic in each queue. When traffic is available, the scheduler maps it to the appropriate queue. For example, video and voice traffic are kept is queued with higher priority than background traffic.Notable QoS Traffic Scheduling MethodsWeighted Round Robin ... Read More

Worldwide Interoperability for Microwave Access (WiMAX)

Moumita
Updated on 09-Jan-2020 10:17:46

385 Views

Worldwide Interoperability for Microwave Access (WiMAX), is a wireless microwave technology based on the IEEE 802.16 standards. It was originally published in 2001 by WiMAX forum, the version which is now called fixed WiMAX. It is similar to Wi-Fi, though it provides higher data rates up to 1 Gbps even at distances of 30 miles.WiMAX forum defines WiMAX as – A standards-based technology enabling the delivery of last-mile wireless broadband access as an alternative to cable and DSL.Features of WiMAXWiMAX is a coalition of wireless industry based upon IEEE 802.16 standards.It aims for the advancement of broadband wireless access (BWA) ... Read More

Comparison of 802.16 with 802.11

Moumita
Updated on 09-Jan-2020 10:16:11

2K+ Views

IEEE 802.16 is a standard that defines Wireless Interoperability for Microwave Access (WiMAX), a wireless technology that delivers network services to the last mile of broadband access.The IEEE 802.11 standard that lays down the specifications of the wireless local area networks (WLAN) or Wi-Fi, that connects wireless devices within a limited area.The following chart gives a comparison between 802.16 and 802.11 −FeatureIEEE 802.16IEEE 802.11TechnologyDefines WIMAX.Defines WLANs or WiFi.Application AreaLast-mile of broadband wireless access.Limited area forming wireless LANs.Versions of the Standard802.16a, 802.16d, 802.16e, 802.16m etc.802.11a, 11b, 11g, 11n, 11ac, 11ad etc.Domain of UsageIt is used for a wide area mostly outdoors.It ... Read More

What is dynamic frequency selection (DFS)?

Moumita
Updated on 09-Jan-2020 10:13:47

527 Views

Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices.FeaturesDFS is a legal mandate for all IEEE 802.11 devices which share 5 GHz radio spectrum with radar.DFS was adopted in IEEE 802.11h standard for wireless transmissions. It came up in 2003, when the wireless network started using 5 GHz band that is primarily used by radar systems.The objective of DFS is to prevent co-channel interference of signals between the primary user, i.e. radar systems, and the ... Read More

What is wireless broadband (WiBB)?

Moumita
Updated on 09-Jan-2020 10:10:23

6K+ Views

Wireless broadband (WiBB) a networking technology designed to impart highspeed Internet and data service through wireless networks. Wireless broadband may be delivered through wireless local area networks (WLANs) or wide area networks (WWANs).Similar to other wireless services, wireless broadband can be either fixed or mobile.Features of WiBBWiBB is similar to wired broadband service since they connect to an internet backbone, with the difference that they use radio waves instead of cables to connect to the last mile of the network.The range of most broadband wireless access (BWA) services varies around 50 km from the transmitting tower.Download speeds provided by some ... Read More

Advanced Encryption Standard (AES)

Moumita
Updated on 09-Jan-2020 07:53:44

2K+ Views

The Advanced Encryption Standard, or AES, is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of USA. It is implemented worldwide both in hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless networks.Features of AESAES is a subset of Rijndael block cipher.It is a successor of Data Encryption Standard (DES) and is stronger and faster than DES.It is a symmetric key symmetric block cipher.It operates on 128-bit (16 bytes) data.The cipher key may be of 128, 192 or 256 bits.All computations are ... Read More

Wired Equivalent Privacy (WEP)

Moumita
Updated on 09-Jan-2020 07:50:51

3K+ Views

Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide the same level of security and confidentiality in wireless networks as in wired counterparts.Features of WEPWEP was introduced as a part of IEEE 802.11 standard in 1997.It was available for 802.11a and 802.11b devices.WEP uses encryption of data to make it unrecognizable to eavesdroppers.It uses RC4, a stream cipher, for ... Read More

WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2)

Moumita
Updated on 09-Jan-2020 07:47:58

407 Views

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards to protect network stations connected to WiFi networks. They were developed by WiFi Alliance for delivering sophisticated data encryption technologies and improved user authentication than the pre-existing Wired Equivalent Privacy (WEP).WiFi Protected Access (WPA)Wi-Fi Protected Access (WPA) was supported in IEEE 802.11i wireless networks and was proposed in 2004. It was backward-compatible with the existing WEP that led to its rapid, hassle-free adoption.The encryption method adopted in WPA is the Temporal Key Integrity Protocol (TKIP). TKIP includes per-packet key, integrity check, re-keying mechanism. It dynamically generates an ... Read More

Advertisements