Showing posts with label TechTerms. Show all posts
Showing posts with label TechTerms. Show all posts

Sunday, 30 December 2018

Magnetic Core Memory[What Is Magnetic Core Memory]

Magnetic Core Memory

magnetic core memory
Magnetic Core Memory

Magnetic core memory is a non-volatile random access memory. In 1951 at MIT magnetic core memory was developed. Almost all early computers used the magnetic core as their primary internal memory before the wide availability of semiconductor memory. The basic magnetic core memory cell is a small doughnut-shaped core which was made of a ferromagnetic material. These cores are called ferrite cores. Its diameter is almost 0.05 inch. Here in magnetic core memory, there is a small wire which threaded through the centre of the magnetic core. When a current pulse is passed through in this wire, a magnetic flux is set up in the core in a direction that depends on the direction of the current. Because of the magnetic retentivity of the core, it stays magnetized even after the current pulse is terminated. In other words, it is non-volatile. The two directions of magnetization are used to represent 1 and 0, respectively. Stored data are read from a core by magnetizing it in the 0 direction and using a second threaded wire as a sense wire. The size of the voltage induced in the sense wire will be greater if the core is initially in 1 state rather than 0 state. The reading of a magnetic core memory is said to be destructive since it always leaves in 0 state. Thus, the data can be rewritten after a read operation.
The magnetic core memory system has access times from 100ns to 500ns. It can still be found in some old minicomputers and mainframes. But for all practical purposes, their large physical size and complex interface circuitry have made them virtually obsolete.

Saturday, 29 December 2018

Ethernet[What Is Ethernet]

Ethernet:

ethernet
Ethernet Connection Cable

Ethernet is a LAN technology with which we can connect many computers together and transfer data between them. To build ethernet connection we use mainly 3types of ethernet cables which are:
1. Coaxial Cable
2. Twisted Pair Cable
3. Optic Fibre Cable

Coaxial Cable:
It is a signal wire. It made with an insulator, metallic shield and plastic. In this cable, insulator controls the signal of our data. Metallic shield controlled electromagnetic interference. And plastic prevents the wire from water and other external strikes.

Twisted Pair Cable:
This cable basically made with 2 or 4 copper wire. To prevent cross talk it patches each other.

Fibre Optic Cable:
Fibre optic cable is totally different from coaxial cable and twisted pair cable. Mainly it transfers data through light. Therefore it's speed is higher than coaxial and twisted pair cable.

In 1970 ethernet was first developed by engineers at Xerox Parc(a Xerox company) in California. After that Ethernet replaced with large LAN technologies such as ARCNET, FDDI and Token ring. When we talk about this kind of large LAN technology. Let's know a little bit of these.
The Token ring is a communication protocol for local area network. There is a three-byte frame which is called as "token" which moves around a "ring". ARCNET is known as Attached Resource Computer Network. It is also a communication protocol like Token ring. And FDDI which is known as Fibre Distributed Data Interface is a data transmission network connection. First, it was built with optical fibre but later with copper cable. That is why it is also called as Copper Distributed Data Interface. The ethernet is divide by many short pieces which is known as frames. These frames are the main part of the ethernet. Basically, it checks the error and checks the destination addresses. Here a new concept comes, which is the MAC address. The Media Access Control(MAC) address also checks the data packet along with the error.                                                                                                                                             
 If two devices try to transfer data between them at the same time then data packets face problem to connect with its destiny. To solve this kind of problem, the IEEE(Institute Of Electrical And Electronics Engineers) developed the Carrier Sense Multiple Access with Collision Detection(CSMA/CD) protocol, which allows devices to check that kind of data transferring problem. So, we can say that Ethernet is a standard type of protocol used to connect devices.

ethernet


How Ethernet Works:
Think with an example that, you have a router. And you have connected all your smart devices together like computer, printer and others. Now when you give a command to your printer to print something then the data command goes into the router and then router send this message to the printer. In the past 30 years, ago there was a fixed coaxial cable which connects this all devices with a single cable. That time if a computer wants to send any data then it had to shout in the network to stop other devices.When other devices stopped then the process starts. If those two devices send that at the same time, then the communication starts with them. But there was a problem with this method. Because if more than two devices send data at the same time, then the ethernet cannot work. To solve this problem MAC or Media Access Control Address concept comes. Every network device has a unique number which is MAC. With this MAC address, every network devices got a globally unique name. Thus the problem solved. Now when we send any data the MAC address goes into the router and then the router sends its prefixed MAC address to another device. Thus the Ethernet works.

Wednesday, 26 December 2018

What Is Cache Memory

Cache Memory:

cache-memory

We know that CPUs are faster than memories. Day by day engineers are doing a lot of hardworking to make the chip smallest. They inputting more and more circuits on a single chip and thus they make a CPU so faster. As well as memory designers are also using various of technology to increase the memory capacity but they are not able to make its speed. Actually, the problem is not technology. The engineers are trying to build a memory which will as fast as CPU. But here a problem comes. If we want a high-speed memory then we have to locate it on the CPU and this is not an impossible task. But to locate it on CPU the total size will highly increase. To solve this kind of problem engineers are combining a small amount of fast memory with a large amount of slow memory. And we want huge facilities at a reliable price. And here the concept of cache memory comes. Basically, there are three types of memory is our computer. These are Hard drive, RAM and cache memory.

Cache comes from the French word cacher which means to hide. We can say that cache memory is a storage memory which can store top uses computer programs with a higher speed. It is a volatile memory. It is the fastest memory portion in a computer. But its storing capacity is very low respect to others memory. There are three types of cache memory:
1.   Level 1(L1) cache or Primary cache.
2.   Level 2(L2) or Secondary cache. 
3.   Level 3(L3) or Main Memory.

1. Level 1 or Primary Cache:

 L1 is the fastest cache memory which stays inside the processor. But it is very small than other cache memory. The storing capacity of L1 cache is between 2KB to 64 KB.

2.  Level 2 or Secondary Cache:

 L2 cache can stay inside the processers or others IC chips in processor. But where they stay is not a great matter because these chips are connected by a bus and it is quite fast to process. The storing capacity is between 256KB to 512KB.

3.  Level 3 or Main Memory:

L3 cache is the separate memory which speed is much more than a RAM. And its storing capacity is between 1MB to 8 MB.

How Cache Memory Works:

Basically, cache memory stores our daily important data command. When we give a command to the processor then it gets so many commands and to read or write any data. Here cache memory takes a major role. It stores our frequently used data which we need almost every time to operate the computer. Now when we give a command to computer then it will not go to RAM. First, it will check the cache memory and will take the instruction to process. Otherwise, it will go to RAM to pick up the instruction. So thus cache memory helps the processor to work fast. But sometimes when we give a command to the computer and it fails to find the instruction on the cache memory then again it goes to RAM to find that instruction. In that time the processor does delay which is known as cache latency. Thus cache memory works.
cache-memory
Working Of Cache Memory



Best Budget Laptop For Web Developers 2019

Monday, 24 December 2018

Protocol-What Is Protocol

Protocol

A protocol is a set of rules which determines how the data will be transmitted over in the network. Protocol are stored in binary information. It is a mixture of bits, characters, and integers.

Suppose there are 2 machines and we need to transfer some data to another machine. In this case of data transfer, there are some rules, which are known to us as Protocol. So, we can say that in networking protocol is a set of instructions that define how data will be transferred and how devices will communicate with each other. It is a communication standard which helps to communicate two devices. There are 3 levels in a protocol. These are:

1.  Hardware Device Level
2.  Software Level
3.  Application Level

And there are 2 types of protocol:

1. Standard Protocol:
Standard protocol helps to communicate multi winder means products of a different company.FTP,DNS,DHCP,SMTP,Telnet,TFTP are the standard protocol which are available for public users.

2.  Proprietary Protocol:
A proprietary protocol cannot support multi winder. It can support only company own devices. This is not available publicly. If anyone wishes to use that proprietary protocol, then he/she have to take permission of that protocol company means by which the protocol was created. Let's talk about IMessage which has made by Apple. If there are two Apple devices then by the proprietary protocol the communication could be possible. But in the case of other company devices, it will not be possible.

What Is Encryption

Encryption

what-is-encryption
Encryption

The internet is an open public system. We send and receive information over the internet connection. But even we know it is an open public system, we still exchange a lot of private data through the internet. We send very sensitive things like bank information, credit card number,cvv, password, emails, and others. So now, here it is a big question that, how do we keep this private stuff safe.

Encryption is a process to keep any kind of data safe. Scrambling a message to hide the original is encryption. And decryption is the process to unscrambling the message to make that readable.

This is a very simple idea in encryption and decryption and we have been doing it for a very long time. One of the first well-known methods of encryption was CAESAR'S CIPHER which was made after Julius Caesar. Julius Caesar was a Roman general who keeps encrypted his military commands by his enemies.

Caesar Cipher was an algorithm, that subtracts each letter from the original message with a letter of a certain number of steps down to the alphabet. In this case, when sender and receiver know that number then it called a key. To decrypt the message it will do to reverse the number.

what is encryption


But there was a big problem with Caesar Cipher. As Caesar Cipher was a method of number increase and decrease that is why it was very easy to crack the encrypted message by trying every possible letter and there, in the English alphabet, there are 26 letters which means you only need to try almost 26 keys to decrypt the encrypted message. Therefore a new method came. In Caesar Cipher we tried to encrypt the message by using only a fix number. Let imagine the encrypt message is "Hello".So here by using a key of 5, the message will be "Mjqqt".Now to make this difficult we will add a different amount of number key to decrypt. If we consider using 10 digit encryption, there could be 10 billion possible key solutions. That will be very difficult for us even it could take many centuries. But with a computer, it will take only a few seconds to decrypt the encrypted message. Thereafter encryption with 128/192 and 256-bit encryption came in market. Today's secure communications are encrypted with 256-bit encryption, which is very difficult to crack with so many supercomputers.

There are two types of key encryption.
                                                             1.  Symmetric
                                                             2.  Asymmetric
When the sender and the receiver share the same key to encrypt and decrypt a message then it is called as symmetric encryption. It will not available except the sender and receiver. But a public key which can be exchanged with anybody called asymmetrically. So, we can say that encryption is the most secure process for transferring data. When we send a message using an encrypted messaging service like facebook, WhatsApp.That time the service wraps takes our message in code and make an encryption key regarding that message which only the reciever of the message could decrypt.

what-is-encryption
Encryption



Sunday, 23 December 2018

What Is Download-Download

Download

We are very familiar with this word "Download".On the internet, a download is a process to receive data from another remote system, which can also say as a server. Server is the storage point where every related data are stored. When we click to download any files, photos or videos or any other thing on the internet, then the data file from the server comes to us as a remote server. This same concept applies to upload. When we upload something on the internet, then from our source the data goes to the server through the internet. We cannot say download as data transfer, because the download is the process between source and server. It is just a process of receiving data from the server through the internet.
From the internet user's point of view, a download is a request from a user to the server to send data through the internet. Basically, this "Download" term is associated with videos, songs, games, pictures and other programs. In any smart device when we click on any download option the file destination opens, where the downloaded file will store.
                                                       

what is download

What Is Domain

Domain

In this universe every object, every person has its own name with which we can identify one thing from another. This same concept applies here in the name Domain.

A Domain name is nothing but website name. Basically, domain is the address where anybody in this earth can access our website using internet connection.
We everyone heard about IP address which stands for Internet Protocol address. An IP address is the series of numbers for a particular website or mobile phone or any network connection. As IP address is a bunch of numbers, so it's become very difficult for us to remember this number to access. To avoid this type of problem in the year 1985 on 15th of March a Massachusetts computer company, Symbolics first launched their domain name "symbolics.com".It can say that domain name is the alternate remembering process of an IP address.

There are two types of domain. The first one is SLP which stands for second level domain and the next one is TLD which stands for top-level domain. The domain name can be a maximum of 63 characters. It is basically an URL or address of a website. When we are talking about an URL, it is also important to say, there are 5 parts of a full URL. These parts are:
1.  Protocol:
                   This is hypertext transfer protocol("https://").
2.  Subdomain:
                  "www. " is the subdomain of every website.
3.  Domain:
                   This is one's actual website name.
4.  Directories
5.  Webpage:
                   It usually is written in hypertext markup language.

Any domain name is a combination of some letters and numbers. The extension makes a major role while choosing a domain name. It is to be noted that domain name must be registered before use it. If anyone searches by typing our web domain name "motech360.blogspot.com" they will go only on our website not others.  

Wednesday, 19 December 2018

What Is Microprocessor-Microprocessor

MICROPROCESSOR

A Microprocessor is a Large scale integration(LSI) or Very Large scale integration(VLSI) device that can be programmed to perform arithmetic and logic operation and other function in a prescribed sequence for the movement and processing of data.
                                                           
Microprocessor

These Microprocessors are available in word lengths of 4,8,16,32 and 64 bits. Nowadays 128-bit microprocessors are being used in some computers. The 4-bit processors are virtually obsolete, because of their low cost, small size, low power consumption.                                                                                                                       
                                                                    
                                                                             
Microprocessor

The Microprocessor is used as the central processing unit in a microcomputer system. The speed of the microprocessor determines the maximum speed of a microcomputer.
Basically, we can say that a microprocessor is a computer processor which operate all the things on a computer. It is a digital integrated circuit which accepts an only binary form of a given instruction and converts that into machine language and operates all the instruction given by a user. Microprocessors contain sequential and as well as a combinational circuit. Basically, microprocessors are nothing but the brain of a computer, which is known to us as a central processing unit(CPU).
                                                                           
                                                         
                                                               CPU/Microprocessor


                                           
                                           Best Budget Laptop For Web Developers 2019











Sunday, 1 July 2018

What Is VPN-VPN

VPN                      

                    
what is vpn
VPN

VPN Means Virtual Private Network.



                                                                    
what is vpn
VPN



VPN Is A Method/Process Of Connection That Is Based On Security And Private Public Networks.




VIRTUAL PRIVATE NETWORK  Is Sensitive Network. Mainly It Prevents Sensitive Data.


VPN Has So Many Features. The Most Common Features Are-

                 1.   Connecting Yourself To A VPN, You Can Hide Yours IP Adress.
                 2.    This Network Can Protect Your Private Data.
                                             
what is vpn



Security Is Most Important In Our Daily Life. We All Time Try To Prevent Our All Files, Documents, And Data. To Retain This Security We Use VPN.
It Can Protect Our Data While Online Transfering Modes.No Tech Skills You Need To Know About VPN. Just Sign up, And Connect Yourself To Virtual Private Network. It Is Very Easy To Use.

                                             
what is vpn