Found 1112 Articles for Internet

What is Campus Area Network (CAN)?

Bhanu Priya
Updated on 22-Mar-2022 12:28:17

5K+ Views

Campus Area Network (CAN) is also called a corporate area network and it helps to like LAN with small geographical space. The main objective is offering the best accessibility of campus residential regions like schools, colleges, university, small institutes (Campus), and corporate area (building). It is larger than LAN but small than WAN and MAN networksIt can cover many buildings in an area. Here all computers are connected together and have some relationship to each other.For example − Different buildings in a campus are connected using Campus Area Network (CAN) they help to interconnect departments, library and computer laboratories.Given below ... Read More

What are the differences between WiFi Repeater and WiFi Extender?

Kiran Kumar Panigrahi
Updated on 04-Aug-2022 08:40:41

1K+ Views

A wireless network connection originating from a router has a limited coverage range beyond which weak signals become unreliable. As you go further away from the router, the signals will get less strong, and your internet connection will become less reliable. When this occurs, we have a need to boost the strength of the WiFi signal and expand the area that it covers. WiFi repeaters and extenders are what we need to accomplish these tasks. There is a common misconception that a WiFi extender and a repeater are the same thing. It is not so; there are significant differences between ... Read More

What are the differences between IoE and IoT?

Bhanu Priya
Updated on 22-Mar-2022 06:45:59

1K+ Views

Let us understand the concepts of Internet of Things (IoT) and Internet of Everything (IoE) before learning the differences between them. Internet of Things (IoT) IoT is called the Internet of Things and it is nothing but an interlinkage between various items that means, the physical items interact with each other and with the external environment with the help of the internet. They can respond to certain external changes and can work in an artificially intelligent manner. It is also helpful in making certain decisions based on the pattern recognition technique.For example − Every morning at 6am the coffee machine ... Read More

What is WIFI Protected Setup (WPS)?

Bhanu Priya
Updated on 22-Mar-2022 06:02:06

519 Views

The full form of WPS is WIFI Protected Setup and it is a newly invented method. In this method a new device is added to the wireless network access point using just a Password or a Pin or simply by clicking a button.When a user pushes a button on the access point the network is visible to the user and he can connect to it with a password or a PIN and as soon as it is done the network becomes invisible and thus it reduces vulnerability. So it is a method of adding a new device to a network ... Read More

What are the differences between Non-persistent and p-Persistent CSMA?

Bhanu Priya
Updated on 21-Mar-2022 13:05:57

2K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMAp-persistent CSMAThe p-persistent CSMA is used whenever the channel has time slots so that the time slot duration is equal to or greater than the maximum propagation delay time. The p-persistence senses the channel whenever a station becomes ready to send.Suppose if the channel is busy, then the station has to wait till the next slot is available.The p-persistence transmits with a probability p when the channel is idle. With a probability q=1-p, the station has to wait for the beginning of the ... Read More

What are the differences between 1-Persistent and Non-Persistent CSMA?

Bhanu Priya
Updated on 21-Mar-2022 12:50:07

5K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More

Differentiate between 1-Persistent and p-Persistent CSMA

Bhanu Priya
Updated on 21-Mar-2022 12:47:19

4K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More

What are the differences between thunderbolt 2 and thunderbolt 3?

Bhanu Priya
Updated on 21-Mar-2022 12:37:06

269 Views

Let us understand the concepts of Thunderbolt 2 and 3 respectively.Thunderbolt 2Thunderbolt 2 connector is a Mini DisplayPort connector developed by Apple. It allows a maximum throughput of 20 gigabits per second, whereas the original Thunderbolt port can deliver up to a maximum of 10 Gbps. It achieves over the USB 3.0 technology that has a maximum speed of only 5 Gbps.Given below is the image of thunderbolt 2 −Thunderbolt 3It is the latest and the fastest version of the Thunderbolt provides a maximum throughput of 40 gigabits per second. It was introduced in 2015, by Intel’s. It proves to ... Read More

What is Transport Layer Security (TLS) Handshake?

Bhanu Priya
Updated on 21-Mar-2022 12:33:53

6K+ Views

Transport layer security protocol is one of the security protocols which are designed to facilitate privacy and data security for communications over the Internet. The main use of TLS is to encrypt the communication between web applications and servers, like web browsers loading a website.TLS is used to encrypt other communications like email, messaging, and voice over IP (VoIP). TLS was proposed by the Internet Engineering Task Force (IETF), which is an international standards organization.ComponentsThe three main components that TLS accomplishes are as follows −Encryption − It is used to hide the data being transferred from third parties.Authentication − It ... Read More

What are the types of Transmission Technology?

Bhanu Priya
Updated on 21-Mar-2022 12:31:19

6K+ Views

The transmission technologies are divided into two types −Broadcast networks andPoint-to-point networks.Let us begin by learning about broadcast networks.Broadcast NetworksTransmitting data from one source host to all other hosts present in the same or other network is called broadcast. It is called a one to all transmission.Types of broadcastBroadcast is classified into two types, which are as follows −Limited BroadcastTransmitting data from one source host to all other hosts present in the same network is called a limited broadcast. Given below is the diagram of limited broadcast −In Limited Broad casting if the destination address is 255.255.255.255 then the packet ... Read More

Advertisements