- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1625 Articles for Computer Network
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
934 Views
Inter-Switch LinkISL is a VLAN protocol that stands for Inter-Switch Link. Cisco's ISL is a proprietary protocol that is only utilized between Cisco switches.A point-to-point VLAN context can support up to 1000 VLANs and is only compatible with Fast Ethernet and Gigabit Ethernet networks.ISL encapsulates an Ethernet frame with a header that sends VLAN IDs between switches and routers. The tag in IEEE 802.1Q is internal.An Ethernet encapsulated ISL frame will typically start at 94 bytes and grow to 1548 bytes in size. Encapsulation is used to develop the protocol.The frame is given a 26-byte header and a 4-byte CRC ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
6K+ Views
What is a Denial-of-Service Attack?A Denial-of-Service (DoS) attack is an attack on a computer network that limits, restricts, or stops authorized users from accessing system resources.DoS attacks work by flooding the target with traffic or sending it data that causes it to crash. It deprives genuine users of the service or resources they expect to receive.DoS assaults frequently target high-profile corporations such as banks, commerce, media companies, and government and trade organizations' web servers.Even through DoS assaults seldom result in the theft or loss of critical information or other assets, they can take a lot of time and money to ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
12K+ Views
TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. TCP/IP is a suite of protocols used for the communication of devices on a network. The network can be of any type: Internet or personal networks like the intranet, extranet, etc.The modern developments that we use on the Internet are only possible because of the TCP/IP suite. Although the name suggests only two protocols, it contains other protocols in it. Let us look at the functioning of this suite in detail.Working of TCP/IPIn simple terms, TCP takes care of how data is transferred in a network.It breaks down ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
57 Views
The United States military is considered to be one of the most sophisticated forces in the world. However, it was challenged and called into question by a 2019 attack on one of the United States' naval stations.Ryuk RansomwareThe US Coast Guard's Christmas 2019 celebrations were apparently ruined by a Ryuk Ransomware assault, which purportedly interrupted government agencies' activities for more than 33 hours. A risk management program was created in accordance with the security protocol, following the best practices outlined in the NIST Cybersecurity Framework (CSF) and NIST Special Publication 800-82.This is a form of ransomware assault that may have ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
8K+ Views
Datalink is a layer in the Open System Interconnections. It is the second layer in between the physical layer and the network layer. It manages the connection between the two nodes. Data links integrate certain methods like error control, flow control, and associated link management functions.Some of the main functions of the data link layer include providing a straightforward service interface to the network layer, framing flow control and error recognition, and frame formatting.Types of Data Link LayersData Link layer is mainly of two types −Logical Link Control Sub-Layer (LLC)Media Access Control Sub-layer (MAC)Logical Link Control Sub-Layer (LLC)It gives logic for ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
94 Views
We know that different companies have been trying to help people use cloud computing on the Internet in the past few years. As a newbie, it is not easy to choose from the different types of cloud services out there because most of the services are not free, and it might take a tremendous amount of time to try every service.Let us compare two major services: Google Drive and HCL Connections. Note that HCL Connections is not a cloud service.Google DriveGoogle Drive is a file hosting service provided by Google. It was launched on April 24, 2012. It allows users ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
80 Views
Backblaze B2Backblaze is a company that provides cloud storage and data backup services. It was founded in 2007 by Gleb Budman, Billy Ng, Nilay Patel, Brian Wilson, Tim Nufire, Damon Uyeda, and Jones.The firm's two primary products are B2 Cloud Storage and Computer Backup, which are aimed at the commercial and consumer sectors.In addition, Backblaze launched a new project, Backblaze B2 cloud storage, in September 2015. It is focused on software integration for many types of enterprises.Backblaze has four data centers, three situated in the United States and one in the European Union.The files are encrypted on the user's PC, ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
147 Views
HCL ConnectionsHCL Connections was founded by IBM and later acquired by HCL in 2019.It's an enterprise collaboration tool that makes it easier for teams to work together more effectively. It is used by both individuals and small/big enterprises. It uses the 2.0 development of the web.They support many types of Plug-ins like Microsoft Outlook, HCL Lotus Notes, HCL Sametime, etc.The pricing starts from 6 $/Month. They do not have a free version.HCL Connections offer their users free 5 GB of storage and maximum storage of 1 TB for paid users with a maximum file size of 2 GB.It is supported by almost all ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
2K+ Views
Both WiFi and 3G technology are wireless technologies that are widely used to send and receive data wirelessly. WiFi is for high-speed Internet access that connects nearby devices with each other and share the Internet via hotspots, whereas 3G technology is a set of standards for wireless mobile communication systems.Go through this article to find out more about the features of WiFi and 3G technology and how they are different from each other.What is WiFi?WiFi stands for Wireless Fidelity. It defines any network based on the 802.11 standards, allows computers and devices with the required wireless capacity to communicate via ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
868 Views
WiFi networks cover some portions of the area, while mesh networks can cover more wide areas like your garden, home. The WiFi network sends the data to and from a single axis. The device which is kept far away gets the weaker signal which leads to the connection problem.If the owners of the house have thick walls, there is a limitation of WiFi. Routers will struggle to get the signal in various rooms of the same place. Therefore, some parts of the houses remain out of range.Z-waveFor home automation, the Z-wave protocol is used for communication between devices. It allows ... Read More