Found 1625 Articles for Computer Network

Block Cipher Design Principles

Pranavnath
Updated on 05-May-2023 11:05:56

8K+ Views

Block Cipher is an encryption algorithm that works with a symmetric key in a deterministic way. The plain text is divided into several blocks of equal size. If the length of the plain text does not allow block division of equal size, padding is done over the plain text. His type of encryption method can encrypt on blocks of 128 bits, the key can be 128, 192, or 256 bits. In block ciphers, the length of the plain text is equal to the length of the cipher text. This type of encryption process considered each block at a time and ... Read More

50 Common Ports You Should Know

Pranavnath
Updated on 05-May-2023 11:05:03

11K+ Views

Introduction In the world of computer networking, ports play a crucial role in facilitating communication between different devices. A port can be defined as a logical channel through which information streams between two devices. Each port has a unique number assigned to it, known as a port number. Understanding port numbers and their comparing administrations is fundamental for anybody who works with computer systems. In this article, we'll examine 50 of the most common ports that you should know. These ports are assembled into different types based on their characteristics and utilization. We'll investigate their highlights, significance, and centrality in ... Read More

Bluetooth Modes

Pranavnath
Updated on 05-May-2023 11:03:43

2K+ Views

Bluetooth is a technology that wirelessly connects with other systems using the radio frequency that uses 2.4 GHz frequency. Bluetooth is accessible up to 10 meters for sharing documents, media, photos, and videos. It avoids the usage of wires making it a wireless technology. It provides a secured data transmission, so the device needs to be paired before any transmission of data. Though a secure connection, the distance for transmission is less compared to today’s emerging technology. Bluetooth divides the data into packets and transmits it through the channels which use frequency hopping spread spectrum. Bluetooth Modes Bluetooth Connection Bluetooth ... Read More

Basic Frame Structure of HDLC

Pranavnath
Updated on 05-May-2023 11:01:49

726 Views

HDLC stands for High-level Data Link Control which is a collection of the protocol that ensures communication purposes among nodes or network points. It was developed by the International Organization for Standardization (ISO). The data to be transmitted is organized in the form of frames which when transferred to the destination is acknowledged for its appropriate arrival. It can be applied to both point-to-point connections and multipoint connections as it is a bit-oriented protocol. The system of Automatic Repeat Request is implemented via HDLC and also full-duplex communications could be done with the help of HDLC. Due to its ... Read More

Advantages and Disadvantages of Ethernet

Pranavnath
Updated on 05-May-2023 10:57:23

2K+ Views

When you see in your organization, there are many computers connected to share data and information, this whole technology is used to connect them in networks such as cables, computers, wires, protocols, and chips, all compose this Ethernet. As it is explained in very simple language to give this a proper definition, Ethernet is a technology used to connect wired computers in a network which is commonly used in Local Area Networks (LAN, MAN, and WAN). Some applications of Ethernet are educational Institutions such as schools, Private learning institutions, Universities, Company offices, Hospitals, etc. Types of Ethernet Cables There ... Read More

Address Resolution in DNS (Domain Name System)

Pranavnath
Updated on 05-May-2023 10:56:10

1K+ Views

DNS (Domain Name System) is an essential component of the internet infrastructure that translates human-readable domain names into computer-readable numbers called IP addresses. When you type in a website address in your web browser, then DNS translates into an IP address such as 126.32.0.36 (Assume) this IP address is used by computers for identification and then, they communicate with each other. The process of converting domain names into IP addresses is called address resolution. Address resolution plays a critical role in the functioning of the Internet as it enables users to access websites using easy-to-remember domain names instead of complex ... Read More

Bluetooth vs Bluetooth Low Energy

Pranavnath
Updated on 05-May-2023 10:55:07

825 Views

Introduction Modern electronic devices now almost always have wireless communication advancements. These two innovations, Bluetooth and Bluetooth Low Energy (BLE) are widely used in a variety of electrical devices. Despite sharing the same central idea, they have some significant differences in terms of usability, run, and control utilization. Although both innovations are founded on the same underlying principles, there are some significant differences between them. We'll look at the differences between Bluetooth and Bluetooth Low Energy in this article, as well as several useful examples. What is Bluetooth? Bluetooth may be a remote communication convention that empowers gadgets to communicate ... Read More

Approaches to Information Security Implementation

Pranavnath
Updated on 05-May-2023 10:52:12

3K+ Views

Introduction Information security protects information from disruption, misuse, destruction, disclosure, modification, or unauthorized access. The goal of information security is to protect critical data and privacy both digitally and physically. Information security is abbreviated as InfoSec. The information security adheres to Confidentiality, Integrity, and Availability. Confidentiality − Protect information from unauthorized disclosure of sensitive information. Integrity − The data is to be protected from modification or tampering data by intruders which ensures information is accurate. Availability − The information must be accessible in need of any entity, organization, etc. Other characteristics of Information security are authenticity, accountability, and ... Read More

Applications of Adhoc network and its problem

Pranavnath
Updated on 05-May-2023 10:48:32

2K+ Views

The Adhoc network is a wireless link connected without any fixed infrastructure or infrastructures. Communication is established instantly whenever needed. The node access each other in the network without a base station or fixed station access point. Also, the network is distributed in the local area network. Each node uses radio waves to communicate with each other. Eg:- WLAN, GSM, etc. In a multi-hop distributed architecture, the terminals are connected. The nodes operate for routing, securing, key management, and addressing in an ad-hoc wireless network that does not have a centralized system. The transmission occurs through intermediate nodes from the ... Read More

Baud Rate and its importance

Pranavnath
Updated on 05-May-2023 10:44:25

304 Views

In the field of electronics and communication, the baud rate is crucial to the transmission of information. It refers to the maximum number of flag changes that can be transmitted simultaneously across a communication connection. Bits per second (bps) are used to measure the baud rate, which is frequently referred to as the "information rate." We will explore the importance of baud rate in information transmission in this article, as well as how it may affect the accuracy and consistency of information transmission. What is Baud Rate? A fundamental parameter in serial transmission might be the baud rate. It determines ... Read More

Advertisements