Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Network Articles
Page 54 of 122
What are the differences between Physical and Logical Topology?
The network topology is a structure or the physical arrangement of the network devices, how the components of the network are interconnected with each other.Types of network topology are as followsBusStarRingMeshHybridLogical TopologyIt tells about a network that should be configured for the transfer of information. This is different from physical topology as it does not explain the physical wiring of a network, but instead, it describes the flow of data, information, and back, from one system to another and the routes it takes.Some examples of Logical topology are as follows −Logical Star Topology − Uses logical bus topology to transfer ...
Read MoreWhat is Campus Area Network (CAN)?
Campus Area Network (CAN) is also called a corporate area network and it helps to like LAN with small geographical space. The main objective is offering the best accessibility of campus residential regions like schools, colleges, university, small institutes (Campus), and corporate area (building). It is larger than LAN but small than WAN and MAN networksIt can cover many buildings in an area. Here all computers are connected together and have some relationship to each other.For example − Different buildings in a campus are connected using Campus Area Network (CAN) they help to interconnect departments, library and computer laboratories.Given below ...
Read MoreDifferentiate between Data Privacy and Data Security.
Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ...
Read MoreWhat is ISCII Encoding?
The full form of ISCII is Indian Script Code for Information Interchange. It was established as Bureau of Indian Standards in 1991 and it is based on an earlier Indian Standard IS 10401:1982. It is a type of coding scheme for Indian languages.It is an 8-bit standard where lower 128 characters (0-127) conform to ASCII standard and higher 128 characters (128-255) are used to encode characters from an Indian script.ISCII encoding strategy is used in Unicode in their encoding. Generally the characters of the Indian language derive from the ancient Brahmi script. Mostly all the characters resemble closely to each ...
Read MoreWhat are the challenges of a Computer Network?
Let's try to understand what reliability challenges for computer networks are.This can be defined as packet loss, bandwidth saturation, and latency, but this type of information would be really unhelpful to those IT companies whose networks are small, and failures not well under- stood & might be limited to rebooting.Five reliability challengesThe reliability challenges for a computer network are as follows −Host IdentificationThe Host ID is the portion of an IP address that uniquely identifies a host on a given TCP/IP network.The smaller networks can be easily configured with the help of manual addressing, but it becomes a serious problem ...
Read MoreWhat is Real-time Communication in LAN?
A real-time system means the system is subjected to real-time that means the response should be guaranteed within a specified timing constraint or system should meet the specified deadline.For example − Flight control system, real-time monitors etc.Features of Real-time SystemThe features of real-time system are as follows −Reliability − The system can operate for a long time without any interfere of the humanManageability − In a real-time system the cost of implementation is to be reduced.Performance − The system should be designed for the purpose of working easier and the workload should be reduced.Predictability − Within the given time, the actions ...
Read MoreWhat is the difference between Software Security and Cyber Security?
Let us begin by understanding what software security is.Software SecuritySoftware security is produced to protect and secure servers, computers, cellular devices, and networks from unauthorized access, intrusions, viruses, and several threats. Software security can defend information, users, systems, and organization from a broad range of risks.Software systems can be linked to stealing information, monitor content, enter vulnerabilities, and damage the behavior of the application. Malware can generate DOS (denial of service) or crash the framework itself. Buffer overflow, stack overflow, command injection, and SQL injections are the most common attacks on the software.Software security can represent the software that is ...
Read MoreInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) works in the network layer of the OSI model and the internet layer of the TCP/IP model. It is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices send a message using ICMP. Messages that can be sent include "destination unreachable", "time exceeded", and "echo requests".ICMP is a network layer protocol.ICMP messages are not passed directly to the data link layer. The message is first encapsulated inside the IP datagram before going to the lower layer.Types of ...
Read MoreInternet Protocol version 6 (IPv6) Header
Internet protocol version 6 (IPv6) headers is the next generation of the internet protocol designed to replace the current version, or Internet Protocol Version 4 (IPv4). IPv6 fixes many problems in IPv4, such as the limited number of available IPv4 addresses.IPv6 uses 128-bit addresses; an address space is large enough to last for the predictable future. IPv6 added many improvements to IPv4 in areas such as routing and network auto-configuration.IPv6 is a progressive step from IPv4, some IPv4 functions that do not work were removed from IPv6.IPv6 is an Internet Protocol for packet-switched internetworking; it provides end-to-end datagram transmission across ...
Read MoreDistance Vector Routing (DVR) Protocol
In distance-vector routing (DVR), each router is required to inform the topology changes to its neighboring routers periodically. Historically it is known as the old ARPNET routing algorithm or Bellman-Ford algorithm.How the DVR Protocol WorksIn DVR, each router maintains a routing table. It contains only one entry for each router. It contains two parts − a preferred outgoing line to use for that destination and an estimate of time (delay). Tables are updated by exchanging the information with the neighbor’s nodes.Each router knows the delay in reaching its neighbors (Ex − send echo request).Routers periodically exchange routing tables with each ...
Read More