Found 1625 Articles for Computer Network

Difference between Batch Processing and Stream Processing

Manisha Shejwal
Updated on 03-Aug-2022 11:57:43

980 Views

Computer systems have been handling data since decades, but the volume and speed of handling has become phenomenal in the last few years. Data processing means "the collection and manipulation of items of data to produce meaningful information", has been evolving in terms of speed, efficiency, and leveraging the computing resources, till date. In this article, we will see two important techniques of data processing in the field of computation − Batch processing and Stream processing. We will elaborate them in detail and see how they are different. What is Batch Processing? Batch processing is technique of processing large amount ... Read More

Difference between Baseband and Broadband Transmission

Manisha Shejwal
Updated on 03-Aug-2022 11:45:05

6K+ Views

Data transmission has been crucial in the age of digital communication. Either digital or analogue data can be transmitted over a communication medium to one or more devices, depending on the interfaces in use. There are two important types of data transmission − Baseband and Broadband. Read through this article to understand each type of transmission and the differences between them. What is Baseband Transmission? It is a transmission technology where a single signal is either sent or received through a communication channel such as a cable, in the form of discrete pulses of the single frequency. The frequency of ... Read More

Difference between a Managed and an Unmanaged Switch

Pradeep Kumar
Updated on 22-Jul-2022 07:09:51

2K+ Views

When a network is being designed, the "network switch" that is employed is considered to be the "brain" of the network. The networking hardware ensures that all of the devices remain linked to one another at all times. Therefore, it is essential to select and set up an ideal network switch.Switches can vary in both their physical dimensions and the number of ports that they offer. They can have a maximum of forty-eight ports between them. Two of the most prevalent types of switches are managed and unmanaged switches.What is a Managed Switch?Managed switches are famous for their redundancy, in ... Read More

Difference between Gateway and Firewall

Pradeep Kumar
Updated on 06-Jul-2022 12:25:49

3K+ Views

A gateway is a piece of networking hardware or a network node that allows two separate networks to communicate with one another. Computers and routers are the most typical gateways that can connect a company to the internet. A firewall is a network security system that determines which data packets are allowed to access the network.Read through this article to find out how Gateways are different from Firewalls.What is a Gateway?A gateway is a network hardware device, sometimes known as a network node, that establishes a connection between a host network and a remote network. Because the gateway serves as ... Read More

What is a CDN? (Functions, How does it work, Advantages)

Pranav Bhardwaj
Updated on 02-Jun-2022 10:09:54

411 Views

What is a Content Delivery Network?A Content Delivery Network (CDN) is a collection of computers that keep data copies at several network nodes. A well-designed and adequately executed CDN increases data access by increasing bandwidth and reducing access latency. Web objects, apps, database queries, downloadable data objects, and video streams are all examples of CDN content.A CDN is a collection of computer nodes connected over the Internet to give users access to massive volumes of video or data. CDNs are also known as Content Distribution Networks.A CDN architecture comprises numerous independent components that all work together to give service to ... Read More

What are the differences between Physical and Logical Topology?

Bhanu Priya
Updated on 24-Mar-2022 08:16:11

20K+ Views

The network topology is a structure or the physical arrangement of the network devices, how the components of the network are interconnected with each other.Types of network topology are as followsBusStarRingMeshHybridLogical TopologyIt tells about a network that should be configured for the transfer of information. This is different from physical topology as it does not explain the physical wiring of a network, but instead, it describes the flow of data, information, and back, from one system to another and the routes it takes.Some examples of Logical topology are as follows −Logical Star Topology − Uses logical bus topology to transfer ... Read More

What is Campus Area Network (CAN)?

Bhanu Priya
Updated on 22-Mar-2022 12:28:17

5K+ Views

Campus Area Network (CAN) is also called a corporate area network and it helps to like LAN with small geographical space. The main objective is offering the best accessibility of campus residential regions like schools, colleges, university, small institutes (Campus), and corporate area (building). It is larger than LAN but small than WAN and MAN networksIt can cover many buildings in an area. Here all computers are connected together and have some relationship to each other.For example − Different buildings in a campus are connected using Campus Area Network (CAN) they help to interconnect departments, library and computer laboratories.Given below ... Read More

Differentiate between Data Privacy and Data Security.

Bhanu Priya
Updated on 21-Mar-2022 13:21:09

631 Views

Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ... Read More

Distinguish between Data Privacy and Data Protection.

Bhanu Priya
Updated on 21-Mar-2022 13:18:42

326 Views

To begin with, let us learn the concepts of data protection and data privacy.Data ProtectionData protection is inclusive of the strategies that we can use to secure the privacy, availability, and integrity of our data. It is also called data security or information privacy.Data protection is important for any organization which collects, handles, or stores sensitive data. This strategy can help prevent data loss, theft, or corruption and can help minimize damage caused by disaster.Data PrivacyData privacy is defined as only the authorised person can access the data. It is typically applied to personal health information (PHI), personally identifiable information ... Read More

What is ISCII Encoding?

Bhanu Priya
Updated on 17-Mar-2022 10:43:45

1K+ Views

The full form of ISCII is Indian Script Code for Information Interchange. It was established as Bureau of Indian Standards in 1991 and it is based on an earlier Indian Standard IS 10401:1982. It is a type of coding scheme for Indian languages.It is an 8-bit standard where lower 128 characters (0-127) conform to ASCII standard and higher 128 characters (128-255) are used to encode characters from an Indian script.ISCII encoding strategy is used in Unicode in their encoding. Generally the characters of the Indian language derive from the ancient Brahmi script. Mostly all the characters resemble closely to each ... Read More

Advertisements