Computer Network Articles

Page 54 of 122

What are the differences between Physical and Logical Topology?

Bhanu Priya
Bhanu Priya
Updated on 24-Mar-2022 23K+ Views

The network topology is a structure or the physical arrangement of the network devices, how the components of the network are interconnected with each other.Types of network topology are as followsBusStarRingMeshHybridLogical TopologyIt tells about a network that should be configured for the transfer of information. This is different from physical topology as it does not explain the physical wiring of a network, but instead, it describes the flow of data, information, and back, from one system to another and the routes it takes.Some examples of Logical topology are as follows −Logical Star Topology − Uses logical bus topology to transfer ...

Read More

What is Campus Area Network (CAN)?

Bhanu Priya
Bhanu Priya
Updated on 22-Mar-2022 6K+ Views

Campus Area Network (CAN) is also called a corporate area network and it helps to like LAN with small geographical space. The main objective is offering the best accessibility of campus residential regions like schools, colleges, university, small institutes (Campus), and corporate area (building). It is larger than LAN but small than WAN and MAN networksIt can cover many buildings in an area. Here all computers are connected together and have some relationship to each other.For example − Different buildings in a campus are connected using Campus Area Network (CAN) they help to interconnect departments, library and computer laboratories.Given below ...

Read More

Differentiate between Data Privacy and Data Security.

Bhanu Priya
Bhanu Priya
Updated on 21-Mar-2022 917 Views

Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ...

Read More

What is ISCII Encoding?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 2K+ Views

The full form of ISCII is Indian Script Code for Information Interchange. It was established as Bureau of Indian Standards in 1991 and it is based on an earlier Indian Standard IS 10401:1982. It is a type of coding scheme for Indian languages.It is an 8-bit standard where lower 128 characters (0-127) conform to ASCII standard and higher 128 characters (128-255) are used to encode characters from an Indian script.ISCII encoding strategy is used in Unicode in their encoding. Generally the characters of the Indian language derive from the ancient Brahmi script. Mostly all the characters resemble closely to each ...

Read More

What are the challenges of a Computer Network?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 3K+ Views

Let's try to understand what reliability challenges for computer networks are.This can be defined as packet loss, bandwidth saturation, and latency, but this type of information would be really unhelpful to those IT companies whose networks are small, and failures not well under- stood & might be limited to rebooting.Five reliability challengesThe reliability challenges for a computer network are as follows −Host IdentificationThe Host ID is the portion of an IP address that uniquely identifies a host on a given TCP/IP network.The smaller networks can be easily configured with the help of manual addressing, but it becomes a serious problem ...

Read More

What is Real-time Communication in LAN?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 2K+ Views

A real-time system means the system is subjected to real-time that means the response should be guaranteed within a specified timing constraint or system should meet the specified deadline.For example − Flight control system, real-time monitors etc.Features of Real-time SystemThe features of real-time system are as follows −Reliability − The system can operate for a long time without any interfere of the humanManageability − In a real-time system the cost of implementation is to be reduced.Performance − The system should be designed for the purpose of working easier and the workload should be reduced.Predictability − Within the given time, the actions ...

Read More

What is the difference between Software Security and Cyber Security?

Ginni
Ginni
Updated on 28-Dec-2021 749 Views

Let us begin by understanding what software security is.Software SecuritySoftware security is produced to protect and secure servers, computers, cellular devices, and networks from unauthorized access, intrusions, viruses, and several threats. Software security can defend information, users, systems, and organization from a broad range of risks.Software systems can be linked to stealing information, monitor content, enter vulnerabilities, and damage the behavior of the application. Malware can generate DOS (denial of service) or crash the framework itself. Buffer overflow, stack overflow, command injection, and SQL injections are the most common attacks on the software.Software security can represent the software that is ...

Read More

Internet Control Message Protocol (ICMP)

Urmila Samariya
Urmila Samariya
Updated on 23-Nov-2021 14K+ Views

Internet Control Message Protocol (ICMP) works in the network layer of the OSI model and the internet layer of the TCP/IP model. It is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices send a message using ICMP. Messages that can be sent include "destination unreachable", "time exceeded", and "echo requests".ICMP is a network layer protocol.ICMP messages are not passed directly to the data link layer. The message is first encapsulated inside the IP datagram before going to the lower layer.Types of ...

Read More

Internet Protocol version 6 (IPv6) Header

Urmila Samariya
Urmila Samariya
Updated on 23-Nov-2021 1K+ Views

Internet protocol version 6 (IPv6) headers is the next generation of the internet protocol designed to replace the current version, or Internet Protocol Version 4 (IPv4). IPv6 fixes many problems in IPv4, such as the limited number of available IPv4 addresses.IPv6 uses 128-bit addresses; an address space is large enough to last for the predictable future. IPv6 added many improvements to IPv4 in areas such as routing and network auto-configuration.IPv6 is a progressive step from IPv4, some IPv4 functions that do not work were removed from IPv6.IPv6 is an Internet Protocol for packet-switched internetworking; it provides end-to-end datagram transmission across ...

Read More

Distance Vector Routing (DVR) Protocol

Urmila Samariya
Urmila Samariya
Updated on 23-Nov-2021 63K+ Views

In distance-vector routing (DVR), each router is required to inform the topology changes to its neighboring routers periodically. Historically it is known as the old ARPNET routing algorithm or Bellman-Ford algorithm.How the DVR Protocol WorksIn DVR, each router maintains a routing table. It contains only one entry for each router. It contains two parts − a preferred outgoing line to use for that destination and an estimate of time (delay). Tables are updated by exchanging the information with the neighbor’s nodes.Each router knows the delay in reaching its neighbors (Ex − send echo request).Routers periodically exchange routing tables with each ...

Read More
Showing 531–540 of 1,219 articles
« Prev 1 52 53 54 55 56 122 Next »
Advertisements