0% found this document useful (0 votes)
0 views

Differences

ACN Differences

Uploaded by

shreyadc6
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Differences

ACN Differences

Uploaded by

shreyadc6
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ACN Differences :

1. Interdomain and intradomain

criteria Intradomain interdomain


def inition Intradomain routing is the routing Interdomain routing is the routing between
between an Autonomous system two autonomous systems
protocols RIP,OSPF BGP
Routing tables It requires larger routing tables as it It requires comparatively smaller routing
handles globally tables as it handles locally
Adminstraton Only single administrator I=control the Each AS has its own administrator
AS
Routing Distance vector and link state Path vector
algorithms

1. Distance vector and link state routing

Distance vector Link state


Routing tables are updated by exchanging the Complete topology is shared by the routers to
inf ormation between routers update the routing tables
Entire routing table is updated Only link states are updated
Uses Bellman-f ord Algorithm Uses Dijkstra algorithm
Protocols used are RIP,IGRP Protocols used are OSPF,IS-IS
Distance vector updates the routing table Link state updates the routing table only when there
periodically are changes in the table
It has slow convergence It has f ast convergence
It has count-to-inf inity probelm It doesn’t have count-to-inf inity problem
Distance vector doesn’t have hierarchical structure Link state works best with the hierarchical structure

1. RIP and OSPF

RIP OSPF
RIP stands f or Routing Inf ormation protocol OSPF stands f or open shortest path f irst
It works on Bellman-f ord algorithm It works on Dijkstra algorithm
It uses distance vector to calculate the hop count It uses link state algorithm to determine the best
path
The hop count can be maximum of 15 hops There is no such limitation
It is not intelligent dynamic routing protocol It is more intelligent dynamic routing protocol
RIP exchanges the routing table between the router OSPF exchanges the routing table only when
every 30 sec there are changes
RIP consumes more bandwidth as routing table is OSPF has less bandwidth.
shred periodically.
1. Static and dynamic routing

Criteria Dynamic Routing Static Routing


1. Configuration Automatic: Routes are learned Manual: Routes are manually
automatically using routing protocols. conf igured by the network
administrator.
2. Security Less Secure: Routers share routing More Secure: No automatic route
inf ormation with each other, which can sharing, so it is harder f or attackers to
be intercepted. manipulate routes.
3. Routing Protocols Uses protocols like RIP, OSPF, EIGRP, No protocols required; routes are
BGP. conf igured manually.
4. Cost (Operational High: Requires more CPU, memory, Low: No additional resources are
Cost) and bandwidth to maintain and update required once routes are set up.
routing tables dynamically.

1. Difference Between Static Document and Dynamic Document


Criteria Static Document Dynamic Document
1. Nature Fixed Content: The content Changeable Content: The content changes
remains the same until manually dynamically based on user interaction or
changed. server-side logic.
2. Generation Pre-built Pages: Pages are On-Demand Pages: Pages are generated
created and stored on the server in in real-time when a user requests them.
advance.
3. Interactivity Non-Interactive: No user input is Interactive: Changes based on user inputs,
required f or content to display. searches, or real-time data.
4. Example Uses HTML, CSS (only) to display Uses HTML, CSS, JavaScript, PHP,
Technologies inf ormation. Python, Node.js, and server-side scripting
languages.
5. Server-Side No Server Interaction: The page Server-Side Interaction: Server generates
Involvement is delivered as-is from the server to the page and updates content bef ore
the browser. delivering it to the browser.
6. Database No Database Required: Data is Database Required: Data is fetched from a
Involvement hard-coded into the f ile. database and displayed dynamically.

1. Difference Between HTTP and HTTPS


Criteria HTTP (Hypertext Transfer Protocol) HTTPS (Hypertext Transfer
Protocol Secure)
1. Security Not Secure: Data is sent in plain text, Highly Secure: Uses encryption
making it vulnerable to interception by (SSL/TLS) to protect data, making it
hackers. unreadable to attackers.
2. Data Encryption No Encryption: Data is sent as plain text. Data is Encrypted: Uses SSL/TLS
encryption to protect data f rom
interception.
3. Port Number Uses Port 80 f or communication. Uses Port 443 f or secure
communication.
4. URL Prefix URLs start with http:// (e.g., URLs start with https:// (e.g.,
http://example.com). https://example.com).
5. Certificate No SSL/TLS Certificate is required. Requires SSL/TLS Certificate to
ensure encrypted communication.
6. Data Integrity No Integrity Check: Data can be Ensures Data Integrity: Protects
modif ied by an attacker (man-in-the- data f rom being altered during
middle attacks). transmission.
7. Trust Indicator Not Trusted: Modern browsers show a Trusted: Displays a lock icon in
warning f or HTTP websites as "Not the browser URL bar, assuring users
Secure." of secure communication.
8. Speed Faster: No encryption overhead, so it is Slightly Slower: Encryption and
slightly f aster. decryption add extra processing time.
9. Usage Used f or non-sensitive data or Used f or sensitive data like online
inf ormational websites. payments, banking, login pages, and
e-commerce websites.
10. Cost No Cost: No certif icate is required, so it's Paid or Free SSL Certificates:
f ree to use. Requires a certif icate that can be f ree
(like Let's Encrypt) or paid.

1. Difference Between FTP and TFTP


Criteria FTP (File Transfer Protocol) TFTP (Trivial File Transfer
Protocol)
1. Protocol Type TCP-Based: Uses TCP f or reliable data UDP-Based: Uses UDP, which is
transf er. f aster but less reliable.
2. Port Number Port 21 f or control and Port 20 f or data Port 69 f or data transf er.
transf er.
3. Authentication Username and Password Required: No Authentication: No login is
User login is mandatory. required.
4. Security More Secure: User authentication Less Secure: No authentication, so
provides some level of security. it is less secure.
5. Data Transfer Text and Binary: Supports text and binary Binary Only: Only transf ers binary
Mode f ile transf ers. f iles.
6. File Transfer Size Large Files: Can transf er large f iles. Small Files: Used f or small f ile
transf ers like network
conf igurations.
7. Error Handling Yes: Uses TCP, so errors are corrected Limited: UDP has no error
automatically. correction, so errors may go
unnoticed.
8. Speed Slower: Relatively slower due to error Faster: Since it uses UDP, it is
checking and two channels for control and f aster, but less reliable.
data.

1. Difference Between Telnet and SSH


Criteria Telnet (Telecommunication SSH (Secure Shell)
Network)
1. Security Not Secure: Data is sent in plain text, Highly Secure: Data is encrypted,
making it vulnerable to interception. protecting it f rom eavesdropping and
attacks.
2. Encryption No Encryption: Data (like usernames, Encryption Available: Uses encryption
passwords, and commands) is (like AES, RSA) to secure data
transmitted as plain text. transmission.
3. Authentication Username and Password: Basic Username, Password, and Key-based
authentication, but credentials are not Authentication: Supports key-based
encrypted. authentication f or enhanced security.
4. Port Number Uses Port 23 f or communication. Uses Port 22 f or secure communication.
5. Data Transfer Plain Text: Transmits data as plain Encrypted Data: Transmits encrypted
text. data.
6. Vulnerability Prone to Attacks: Vulnerable to Resistant to Attacks: Prevents
interception, eavesdropping, and interception, eavesdropping, and "man-in-
"man-in-the-middle" attacks. the-middle" attacks.
7. Usage Used in local area networks (LANs) Used f or remote login to servers,
where security is not a concern. routers, and switches where security is
critical.

1. Difference between POP3 and IMAP


Post Office Protocol (POP3) Internet Message Access Protocol (IMAP)
POP is a simple protocol that only allows IMAP (Internet Message Access Protocol) is much more
downloading messages from your Inbox to your advanced and allows the user to see all the f olders on the
local computer. mail server.
The POP server listens on port 110, and the The IMAP server listens on port 143, and the IMAP with
POP with SSL secure(POP3DS) server listens SSL secure(IMAPDS) server listens on port 993.
on port 995
In POP3 the mail can only be accessed from a Messages can be accessed across multiple devices
single device at a time.
To read the mail it has to be downloaded on the The mail content can be read partially before
local system. downloading.
The user can not organize mail in the mailbox On the mail server, the user can directly arrange the
of the mail server. email.
The user can not create, delete,e or rename The user can create, delete,e or rename an email on the
email on the mail server. mail server.
It is unidirectional i.e. all the changes made on It is Bi-directional i.e. all the changes made on the server
a device do not affect the content present on the or device are made on the other side too.
server.

1. Dif f erence between Bellman-f ord and Dijkstra algorithm


Feature Bellman-Ford Algorithm Dijkstra's Algorithm
Purpose Finds the shortest path from a source to Finds the shortest path from a source to
all vertices. all vertices.
Edge Weights Handles both positive and negative Handles only non-negative edge
edge weights. weights.
Negative Weight Detects and handles negative weight Cannot detect negative weight cycles.
Cycles cycles in the graph.
Time Complexity O(V⋅E) O(V^2) (or O((V+E)logV) with priority
V is vertices and E are edges queue)
Approach Uses relaxation repeatedly f or V−1 Uses a greedy approach to select the
iterations. nearest vertex.
Graph Type Works with directed and undirected Works with directed and undirected
graphs. graphs (no negatives).
Priority Queue Not required. Utilizes a priority queue f or f aster
perf ormance.
Complexity for Perf orms poorly on sparse graphs Perf orms efficiently with sparse graphs
Sparse Graphs compared to Dijkstra's. using a heap.
1. Dif f erence between SMTP and POP

SMTP POP
Stands f or Simple Mail Transf er protocol Stands f or Post Of f ice Protocol
SMTP is a simple protocol used to transf er the mail POP the protocol used to transf er mail f rom Mail
f rom sender to mail server server to receiver
It is a Push protocol It is a Pull protocol
It is also called as Message Transf er Agent It is also called as Message access agent
Port Number used is 25 Port Number used is 110
It doesn’t operate in dif f erent modes rather it It operates in two modes Keep mode and Delete
provides commands like HELO/ELHO, DATA, QUIT, mode.
RCPT TO,STARTTLS

You might also like