Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Network Articles - Page 67 of 70
408 Views
Both Google Fi and Ting are Mobile Virtual Network Operator, MVNO and provides telephone calls, SMS and mobile broadband services using cellular networks and WiFi.Google FiGoogle Fi offers wireless services and access to a wide range of online services provided by Google. In the US, Google Fi is available on T-Mobile, Sprint and US Cellular networks.TingTing is a wireless service provider based in Toronto, Ontario. In Ting, there is no subscription plan, users pay as per their usage. Ting ISP was launched in Feb'2012 by Tucow's Inc.The following are some of the important differences between Google Fi and Ting.Sr. No.KeyGoogle ... Read More
4K+ Views
As an analogy, we can think of connection-oriented services as telephone systems, where a connection needs to be established between a sender and a receiver before they can exchange data. In contrast, connection-less services are like traditional postal systems where data exchange can take place between a sender and a receiver without establishing a connection. Go through this article to find out the major differences between connection-oriented and connection-less services. What is Connection-oriented Service? A connection-oriented service is a data transfer mechanism used at the session layer. In contrast to its opposite, connectionless service, connection-oriented service necessitates establishing a session ... Read More
4K+ Views
Unshielded Twisted Pair or UTP are twisted pair cables that are used to transmit both data and voice, as their frequency range is suitable for transmission. UTPs are more cost-effective and are not needed to be grounded. Shielded Twisted Pair or STP are also a twisted pair cables but are required to be grounded, wants more maintenance, have high data transmission capacity and are costlier than UTP. Read through this article to find out more about UTP and STP cables and how they are different from each other. What are Shielded Twisted Pair (STP) Cables? IBM invented shielded twisted pair ... Read More
11K+ Views
Static Routing or Non-Adaptive Routing follows user-defined routing. Here, the routing table is not changed until the network administrator changes it. Static Routing uses simple routing algorithms and provides more security than dynamic routing. Dynamic Routing or Adaptive Routing, as the name suggests, changes the routing table if there is any change in the network topology. During network change, dynamic routing sends a signal to router, recalculates the routes and sends the updated routing information. Read through this article to find out how Static Routing differs from Dynamic Routing. What is Static Routing? One of the essential techniques ... Read More
47K+ Views
Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More
10K+ Views
Optical fibre and Coaxial cables, both are different types of guided media cables. Optical fibre is made up of plastic and glass and is used to transmits signals in form of light or optics whereas coaxial cable is made using plastic and copper wires and is used to transmits signals in form of electric signals.The following are some of the important differences between Optical fibre and Coaxial cable.Sr. No.KeyOptical FibreCoaxial Cable1Transmission TypeOptical Fibre transmits data/signals in the form of light.The coaxial cable transmits data/signals in the form of electrical signals.2MaterialOptical fibre is made using plastic and glass.Coaxial cable is prepared ... Read More
15K+ Views
Both Network OS and Distributed OS work on multiple systems/nodes. The main difference between a network operating system and a distributed operating system is the way they handle resources and communication between devices. A network operating system is primarily concerned with managing resources and communication within a single network, while a distributed operating system is designed to manage resources and communication across multiple networks. Read this tutorial to find out more about Network OS and Distributed OS and how they are different from each other. What is Network OS? A Network OS is a type of operating system that is ... Read More
99K+ Views
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ... Read More
359 Views
If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ... Read More
1K+ Views
In a computer network, the network service runs a software in each of the computers that are part of the network. In Linux System this network software uses a protocol called TCP or UDP along with port number. TCP is known as transmission control protocol and UDP is known as user datagram protocol. In this article we will see how to watch the ports are sockets which are running on this protocols on a real time basis.List of Open PortsAs a first step we look for the open ports that are available in the system. Bye open we mean the ... Read More