Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Pranav Bhardwaj
Page 26 of 40
What is AAA (Authentication, Authorization, and Accounting)?
Authentication, Authorization, and AccountingAuthentication, Authorization, and Accounting (AAA) is a structural framework for gaining access to computer resources, enforcing policies, auditing, providing critical information for service invoicing, and other network administration and security procedures.This procedure is mostly used to allow specified and valid users access to network and software application resources.In relation to the network protocol RADIUS, the AAA notion is frequently utilized.Authentication, authorization, and accounting (AAA) is a method for tracking and regulating user access to network resources on an IP-based network. AAA is frequently set up as a dedicated server.The practice of adding or denying individual users access ...
Read MoreWhat is a Shielded Twisted Pair (STP) cable?
Shielded Twisted PairIBM invented the shielded twisted pair (STP) cable for token ring networks, including two independent wires coated in a foil shielding that prevents electromagnetic interference and speeds up data transmission.STP cables are protected with additional foil or copper knitting jackets to help protect cable signals from interference.STP cables are more expensive than UTP cables but can transmit data at higher prices over longer distances.Electromagnetic interference does not seep out of or into STP cable because of the additional coverageEthernet networks, particularly fast-data-rate Ethernets, frequently use STP cables.The efficiency of the additional covering depends on the following features of ...
Read MoreWhat is Multiple Spanning Tree Protocol (MSTP)?
Multiple Spanning Tree ProtocolMultiple Spanning Tree Protocol (MSTP) is an algorithm that enables easy and full connectivity provided to any Virtual LAN (VLAN) across an Integrated Area Network.MSTP uses Bridge Protocol Data Units (BPDUs) to transmit information to tree-related devices by identifying practical ways to prevent loopholes in the MSTI (Multiple Spanning Tree Instance) and CIST (Common and Internal Spanning Tree). This is done in the same way as the STP was designed, but without the need to enable support links and without the risk of bridge loops.In addition, MSTP allows frames/packets allocated to different VLANs to take different routes ...
Read MoreDifference between RIP and OSPF
Routing Information Protocol (RIP)The Routing Information Protocol (RIP), which uses the hop count as a routing measure, is one of the oldest distance-vector routing technologies. RIP eliminates routing loops by restricting the number of hops permitted in a path from source to destination.RIP permits a maximum of 15 hops, which limits the size of networks that can be supported by the protocol.It also employs split horizon, route poisoning, and hold-down techniques to restrict the spread of incorrect routing information.RIP is not the preferred routing protocol in most networking setups since its time to converge, and scalability is inferior to EIGRP; ...
Read MoreWhat is Advanced Peer-to-Peer Networking (APPN)?
Peer-to-Peer NetworkingPeer-to-peer computing, also known as peer-to-peer networking, is a shared application development that separates tasks or peer-to-peer workloads.Peers are participants in the application who have the same opportunity and are similarly capable. They are supposed to create a peer-to-peer node network.A collection of computers is joined together with equal permissions and responsibilities for data processing in peer-topeer (P2P) networking.In contrast to traditional client-server networking, no device in a P2P network is wholly dedicated to serving or receiving data.Advanced Peer-to-Peer Networking (APPN)The IBM Systems Network Architecture (SNA) includes Advanced Peer to-Peer Networking (APPN). It entails protocols that allow computers to ...
Read MoreDifference between HCL Connections and Jumpshare
HCL ConnectionsHCL Connections was founded by IBM and later acquired by HCL in 2019.It's an enterprise collaboration tool that makes it easier for teams to work together more effectively. It is used by both individuals and small/big enterprises. It uses the 2.0 development of the web.They support many types of Plug-ins like Microsoft Outlook, HCL Lotus Notes, HCL Sametime, etc.The pricing starts from 6 $/Month. They do not have a free version.HCL Connections offer their users free 5 GB of storage and maximum storage of 1 TB for paid users with a maximum file size of 2 GB.It is supported ...
Read MoreDifference between DropBox and BorgBase
DropBoxDropbox is a cloud storage file, synchronization, personal cloud, and client software provided by Dropbox, Inc. Dropbox is an American Corporation headquartered in San Francisco, California. It was created as a start-up company in 2007 by Drew Houston and Arash Ferdowsi, students from MIT. They work on practically all platforms, such as Windows, Mac OS, iOS, Android, and web browsers.The cloud service marketplace is projected to grow in popularity as individuals seek to access their digital information from several locations and devices. DropBox is credited with inventing the storage cloud concept, but it now faces competition.Following are some of the ...
Read MoreAdvantages and Disadvantages of Subnetting
What is Subnetting?Subnetting is a process of separating a single physical network into several logical subnetworks (subnets).A network segment and a host segment make up an IP address subnets formed by extracting bits from an IP address's host component and establishing several smaller sub-networks within a more extensive network.Subnetting enables a business to expand its network without securing a new network number from its Internet Service Provider (ISP). Subnetting reduces network traffic while also hiding network complexity.Subnetting is required when a single network number must be distributed across multiple parts of a local area network.Subnets were created to alleviate the ...
Read MoreComparison between Bluejacking and Bluesnarfing
Bluetooth is a service that helps in sharing data between multiple devices. We communicate with our computers or any other mobile devices with the help of Bluetooth. Also, it allows us to have a conversation without wires. Nowadays, Bluetooth wireless earphones are there that you can use to listen to music and for discussions. The only problem with these Bluetooth devices is that they have their specific range connected with other devices.BluejackingBluejacking works in a similar way to that of Bluetooth. It is used for sending unlicensed messages to the other Bluetooth device. Bluetooth is the shortrange wireless technology for ...
Read MoreThe Gossip Protocol in Cloud Computing
What is Gossip Protocol?Gossip protocol is a computer peer-to-peer communication mechanism or process based on how epidemics spread. To ensure that data is distributed to all group members, several distributed systems use peerto-peer gossip. Since some ad-hoc networks lack a central registry, the only method to disseminate shared data is for each member to pass it on to their neighbors.Because gossip conveys information just like how a virus spreads in a biological community, the phrase "epidemic protocol" is frequently used interchangeably with the gossip protocol.Periodic, paired inter-process interactions are at the heart of the protocol. The amount of data transferred ...
Read More