Features and Characteristics of EIGRP Protocol

Features and Characteristics of EIGRP Protocol Enhance interior Gateway routing protocol (EIGRP) is a hybrid protocol which have both types of features of distance vector protocol and link-state protocols. EIGRP is important topic of CNNA. Features of EIGRP Protocol Following are the some main features of EIGRP protocol. EIGRP is Hybrid protocol which have both …

Read more

Cloud Vs FTP | Difference between FTP server and cloud computing

Cloud vs FTP difference

What is Difference between FTP and Cloud? Cloud or cloud computing is a general term used for different services services, like networking, storage, software applications etc.which are hosted on the internet and It allows us the ability to access different services on the Internet with web browser or with some software application without having to store any data on local system.   What is …

Read more

Ethernet cable types |Networking Cable Types | Categories of twisted-pair cable

Ethernet Cabling Categories Ethernet is a technologies that provides layer-2 (data-link layer) and layer-2 (physical) specifications for controlling access to a shared network medium. It has emerged as the dominant technology used in LAN networking.  Different type of Ethernet Cables: Following are the different types of Ethernet Cable which are used for networking: Coaxial Ethernet …

Read more

Features or Advantages of computer Networking for Organizational Business | Networks Benefits

Advantages of networking

Pros and Cons of Networking: Good communication between your staff is very necessary for growing your business. You can increase business efficiency by sharing info with files sharing, software sharing and databases from a computer network. 1. Communication Speed Network provide you a fast and easy way to communicate efficiently using a network with a group of people. You can enjoy the …

Read more

Difference between Modular Router Vs Non-modular router

What is Non-modular router? Non-modular router are low-end router and have fixed interfaces/Cards, we cannot able to add ports/interfaces latter on. This class of routers used to connect a home or small business ISP users. Non-modular router not only provides SLIP or PPP connection, also supports other protocols such as virtual private network protocols PPTP and IPSec, etc. …

Read more

What is Backbone Network?

Backbone Network definition: Backbone (Backbone Network) is used to connect a plurality of regions or areas with high-speed network. Different network providers have their own backbone network to connect their which are located in different areas. Backbone is usually used to describe the large-scale network structure. Backbone is generally can be a WAN. With modern telecommunications, …

Read more

POSIX Portable Operating System Interface

What is POSIX? POSIX stand for Portable Operating System Interface , POSIX standard defines the interface standard operating system should provide for the application, is IEEE is to run on a variety of UNIX operating system software defined general term for a range of API standard, its official name is IEEE 1003, while the international standard name …

Read more

LAN Vs WAN | difference between LAN and WAN

lan vs wan

LAN and WAN What is the difference? Local area Network Wide area Network   1. LAN referred to as “Local Area Network” WAN Referred to as “Wide Area Network” 2. LAN normally covers a small area for example within a building or under a KM. Whereas WAN covers a very large area which may be in …

Read more

What is Ethernet? Ethernet standards | Advantages of Ethernet


What is Ethernet? Ethernet technology is used to connect multiple devices, such as computers and printers. It allows all the machines connected to share resources, send and receive files, and access to the same Internet connection. When you connect the various computers at home or in the office together in a network to share an Internet connection …

Read more

What is computer Worm? Virus vs Worm

Worm vs Virus Computer worm is a harmful program that differs from viruses by several points. First, the worm is a standalone program that can be found on the hard drive , unlike viruses that lurk like parasites in files or in the executable code in the boot sector of the disk. A worm can arrive directly by the network by taking …

Read more

What is a computer keylogger?

computer keylogger

Keyboard keylogger: A keylogger is a type of spyware to spy specialized keystrokes on the computer that hosts it, and can transmitting via the Internet to an address where an attacker can exploit. Any strike entered on the keyboard or screen viewed is recorded with a timestamp. Some keylogger only create keystrokes log only on the computer where they are installed. …

Read more

What is a spyware?


Computer spyware: Spyware is a spy software who, without your knowledge, can recover data on your PC and monitor your internet activity, including what is typed on your keyboard.  Presence of spyware can cause serious technical damage: the “crashes” to repeat your computer with data loss, system slowdowns, or opening security holes on your computer.   How Spyware are …

Read more

What is computer Trojan?

computer trojan

what are Trojans? A computer software that perform malicious operations without the knowledge of the user are called Trojan. A Trojan is a hidden software that executes commands, which usually gives access to the computer on which it is running by opening a backdoor.   Effects of Trojan: Recovery of passwords or other confidential data on infected computer. Joint …

Read more

What is Denial of Service attack?

DOS attack

Denial of Service attack A Denial of Service is a type of attack to make services unavailable for an indefinite period of time of an user or an organization. It is mostly attacks against servers of a company, so they can be used and consulted. The purpose of such attack is not to retrieve or alter …

Read more