Found 1301 Articles for MCA

Differentiate between HTTP and HTTPS in Computer Network.

Ginni
Updated on 04-May-2021 12:32:58

854 Views

HTTPHTTP stands for "Hypertext Transfer Protocol." HTTP is the protocol used to transfer data over the web. It is part of the Internet protocol suite and defines commands and services used for transmitting web page data.HTTP uses a server-client model. A client, for example, maybe a home computer, laptop, or mobile device. The HTTP server is typically a web host running web server software, such as Apache or IIS.When you access a website, your browser sends a request to the corresponding web server, and it responds with an HTTP status code. If the URL is valid and the connection is ... Read More

What is VPN in Computer Network?

Ginni
Updated on 04-May-2021 12:31:50

11K+ Views

VPN stands for Virtual Private Network. It allows you to connect your computer to a private network, creating an encrypted connection that masks your IP address to securely share data and surf the web, protecting your identity online.A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments.A VPN connection is shown in the figure below ... Read More

What is Intranet in the Computer Network?

Ginni
Updated on 27-Apr-2022 07:43:18

526 Views

An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization’s information or operational systems within that organization.It is designed for the exclusive use of an organization and its associates, such as employees, customers, and other authorized people. It offers a secure platform to convey information and share data with authorized users.It is based on internet protocols (TCP/IP) and is protected from unauthorized access with firewalls and other security systems. The firewall monitors the incoming and outgoing data packets to ensure they don't contain unauthorized requests.So, users on the intranet can ... Read More

What are(Wireless LAN) IEEE 802.11 Networks in Computer Network?

Ginni
Updated on 04-May-2021 12:29:45

8K+ Views

Wireless LAN is one of the fastest-growing technologies. IEEE 802.11 refers to the set of standards that define communication for wireless LANs (wireless local area networks, or WLANs). The technology behind 802.11 is branded to consumers as Wi-Fi.Wireless LAN can be found on college campuses, in office buildings, in hospitals, stock exchanges and in many public areas. It has become popular due to the ease of installation and location freedom with the gaining popularity of laptops.Wi-Fi is now one of the major forms of communication for many devices, and with home automation increasing, even more, devices are using it. Home ... Read More

What are the Token Ring Frame Formats in Computer Network?

Ginni
Updated on 04-May-2021 12:28:46

3K+ Views

There are three types of frame formats that are supported on a Token Ring network such as token, abort, and frame. The token format is the mechanism by which access to the ring is passed from one computer attached to the network to another device connected to the network.Here, the token format consists of three bytes, of which the starting and ending delimiters are used to indicate the beginning and end of a token frame. The middle byte of a token frame is an access control byte.Three bits are used as a priority indicator, three bits are used as a ... Read More

Explain the Token Ring Network (IEEE Standard 802.5) in Computer Network.

Ginni
Updated on 04-May-2021 12:27:26

11K+ Views

In a token ring, a special bit pattern, known as a token, circulates around the ring when all the stations are idle. Token Ring is formed by the nodes connected in ring format, as shown in the diagram below.The principle used in the token ring network is that a token is circulating in the ring, and whichever node grabs that token will have the right to transmit the data.Whenever a station wants to transmit a frame, it inverts a single bit of the 3-byte token, which instantaneously changes it into a normal data packet. As there is only one token, ... Read More

What is GSM in the Computer Network?

Ginni
Updated on 04-May-2021 12:25:42

1K+ Views

GSM stands for Global System for Mobile communication. GSM is a mobile communication modem; it stands for global system for mobile communication (GSM). The idea of GSM was developed at Bell Laboratories in 1970.It is a widely used mobile communication system in the world. GSM is an open and digital cellular technology used for transmitting mobile voice and data services operating at the 850MHz, 900MHz, 1800MHz, and 1900MHz frequency bands.There are various cell sizes in a GSM system, such as macro, micro, pico, and umbrella cells. Each cell varies as per the implementation domain. There are five different cell sizes ... Read More

Differentiate between CIFS and NFS in Computer Network.

Ginni
Updated on 04-May-2021 12:23:28

603 Views

CIFSCIFS stands for Common Internet File System. It is also known as Server Message Block. It is a network protocol whose most general use is sharing documents on a Local Area Network (LAN). The protocol allows a user to manipulate files just as if they were on the local computer.Operations such as read, write, create, delete, and rename are all supported. The only difference is that the files are not on the local computer and are actually on a remote server.NFSNFS stands for Network File System. It is a type of file system mechanism that enables data storage and retrieval ... Read More

What is iSCSI in the Computer Network?

Ginni
Updated on 04-May-2021 12:22:22

281 Views

iSCSI represents Internet Small Computer Systems Interface. It is a transport layer protocol that works on top of the Transport Control Protocol (TCP). It enables block-level SCSI data transport between the iSCSI initiator and the storage target over TCP/IP networks. iSCSI supports encrypting the network packets and decrypts upon arrival at the target.There are multiple means of transports that can be used for iSCSI. The most common is TCP/IP over Ethernet, but Remote Direct Memory Access (RDMA) can also be used with iSER, which is iSCSI Extensions for RDMA. If using iSER, the transport is RoCE or InfiniBand, and the ... Read More

What is DAS in the Computer Network?

Ginni
Updated on 04-May-2021 12:21:33

692 Views

DAS stands for Direct-attached storage. It is computer storage that is connected to one computer and not accessible to another. The System of DAS is attached directly to the computer through the HBA (Host Bus Adapter).As compared to NAS devices, its device attaches directly to the server without the network. The modern systems of this storage device include the integrated controllers of a disk array with advanced features.TypesThere are two types of DAS which are as follows −Internal DASIn internal DAS design, the storage device is privately linked to the server through a serial or parallel bus.External DASIn external DAS ... Read More

Advertisements