- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Kiran Kumar Panigrahi has Published 425 Articles
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
4K+ Views
Both Hubs and Bridges are network connecting devices and both of them broadcast data to every node on a network. Hubs operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Bridges connect various devices ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
6K+ Views
Local Area Network (LAN) is used to connect a group of networked devices to allow communication between them, whereas Virtual LAN is used to enhance the performance of multiple LANs.Read through this article to find out more about LAN and VLAN and how they are different from each other.What is ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
4K+ Views
Both LAN and MAN are computer networks that differ in terms of the geographical area they cover. LANs are private networks limited to a particular geographical area in the range of a few kilometers, while MANs cover a larger area that can span multiple cities and towns.Read through this article ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
Both MAC Address and IP Address are used to identify a computer on a network or on the Internet. MAC address is provided by NIC Card's manufacturer and gives the physical address of a computer. IP address is provided by the Internet Service Provider and is called the logical address ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
A WAN in general is a network of local area networks (LANs) that link to other LANs via telephone lines and radio waves. WAN connections can include both wired and wireless technologies. Wired WAN services include carrier Ethernet, commercial broadband Internet links, etc., whereas wireless WAN technologies include cellular data ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
7K+ Views
The process of turning plain text into an encrypted form (cipher text) is known as encryption. Sensitive data is transmitted in an encrypted form so that it can be protected and a strong encryption mechanism ensures that the data is not misused even if a hacker gets hold of it. ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
Connection-oriented and Connection-less Services are used to establish connections between two or more devices. Connection-oriented Services A connection-oriented service is one that establishes a dedicated connection between the communicating entities before data communication commences. It is modeled after the telephone system. To use a connection-oriented service, the user first ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
7K+ Views
Spoofing is an identity theft where a person tries to use the identity of a legitimate user. Phishing, on the other hand, is a phenomenon where an attacker employs social engineering methods to steal sensitive and confidential information from a user. Spoofing and phishing are both forms of ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
Both Routers and Modems are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet, whereas Modems connect a device like desktop, laptop to the Internet. Routers connect devices across multiple networks. Read through this article to find out ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
6K+ Views
Both Routers and Gateways are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet. Routers connect devices across multiple networks. Gateways, in contrast, function as a node that serves as a gateway to a network's other nodes. Read through ... Read More