Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Network Articles
Page 2 of 122
ADD PPP Command in PPP Configuration
Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session between two devices. One such command is "ADD PPP" command. In this article, we will discuss ADD PPP command in PPP configuration, its significance, and various examples of its usage. What is ADD PPP Command? The ADD PPP command is a configuration command used to create a new PPP session ...
Read MoreWhat are the Top exploited vulnerabilities of 2023?
Introduction Within the ever-evolving scene of cybersecurity, remaining educated approximately the most recent vulnerabilities and abuses is significant. As innovation progresses, so do the strategies utilized by cybercriminals to breach frameworks and compromise delicate information. The year 2023 has seen its reasonable share of vulnerabilities that have been misused by noxious actors. In this article, we are going dig into a few of the best-abused vulnerabilities of 2023, shedding light on the potential dangers they posture and the measures that can be taken to relieve them. Exploited Vulnerabilities of 2023 ChatGPT This vulnerability was distributed in Walk 2023 with a ...
Read MoreMulti-access Channels and Random Access Channels
Multi-access ChannelsMulti-access channels are network channels that allow several transmitters to communicate with a common receiver via a shared channel. These channels are also called multiple access (MAC) channels. The network channel may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.Random Access ChannelsRandom-access channels (RACH) are shared channels used in wireless communication systems to allow mobile devices for call set-up. RACH also handles bursty data transmission. RACH is popularly used by GSM mobiles for transmission over cellular networks.Multiple Access SchemesBoth multi-access channels and random access channels require a scheme to allow ...
Read MoreDifference between Internet and World Wide Web
Many people get confused when they think about the two terms internet and WWW. They use these terms as a replacement for the other. But both are not same and in this article, we will discuss about the difference between the Internet and WWW. What is the Internet? The internet is being used by billions of users all over the world to search data, play games, watch movies, listen to songs, and do a lot of other things. The internet is a network in which a lot of computers are interconnected to each other. People can communicate with each other ...
Read MoreNear Field Communication
Introduction to Near Field Communication (NFC) Near Field Communication (NFC) may be a short-range remote communication technology that permits two electronic gadgets to set up communication when they are set in the near vicinity, ordinarily inside some centimeters. NFC is an expansion of Radio Recurrence Distinguishing Proof (RFID) innovation and works at a recurrence of 13.56 MHz. NFC innovation empowers contactless communication and information trade between gadgets, making it helpful and proficient for different applications. Working of NFC The essential rule behind NFC is using electromagnetic areas for information exchange. It utilizes inductive coupling, where the NFC-enabled gadgets create attractive ...
Read MoreExplain the functions of a Physical Layer
The physical layer meets all these requirements out. The set of rules and procedures for interaction between physical layers are called Physical layer protocols. The layer provides a physical connection different from the physical transmission path because it is at the bit level while the transmission path is at the electrical signal level. This physical connection can be a point to point physical connection or point to the multi-point physical connection, as shown in the figure − The physical layer provides its services to the data link layer, the next higher layer of the OSI model. The ...
Read MoreIntroduction to Host Names: Understanding the Basics
In the world of computers and the internet, host names are a critical component of how devices connect to each other. A host name is a unique identifier that is assigned to a device or a server on a network. It is used to identify and locate devices on the internet or any other network. What is a Host Name? A host name is a label that is assigned to a device on a network. It is used to identify and locate devices on the internet or any other network. A host name is made up of a combination of ...
Read MoreBest Roadmap for Ethical Hacking (Infographics)
A Certified Ethical Hacker (CEH), commonly called a "White Hat Hacker, " is a trained expert who identifies and repairs computer and network security flaws by employing the same techniques and tools used by hostile hackers. From the beginning of the internet, hackers have utilized their sophisticated tools to take advantage of whatever weak spot they might uncover in a system's defenses. On the other hand, security experts following the ethical hacking roadmap are the good guys trying to patch up IT systems before exploiting them. The Certified Ethical Hacker (CEH) credential from the EC Council is highly regarded and ...
Read MoreNetwork Software
Network software encompasses a broad range of software used for design, implementation, and operation and monitoring of computer networks. Traditional networks were hardware based with software embedded. With the advent of Software – Defined Networking (SDN), software is separated from the hardware thus making it more adaptable to the ever-changing nature of the computer network.Functions of Network SoftwareHelps to set up and install computer networksEnables users to have access to network resources in a seamless mannerAllows administrations to add or remove users from the networkHelps to define locations of data storage and allows users to access that dataHelps administrators and ...
Read MoreTCP 3-Way Handshake Process
Transmission Control Protocol (TCP) provides a secure and reliable connection between two devices using the 3-way handshake process. TCP uses the full-duplex connection to synchronize (SYN) and acknowledge (ACK) each other on both sides. There are three steps for both establishing and closing a connection. They are − SYN, SYN-ACK, and ACK.3-Way Handshake Connection Establishment ProcessThe following diagram shows how a reliable connection is established using 3-way handshake. It will support communication between a web browser on the client and server sides whenever a user navigates the Internet.Synchronization Sequence Number (SYN) − The client sends the SYN to the serverWhen ...
Read More