Found 1301 Articles for MCA

What is the difference between SSH and SFTP?

Ginni
Updated on 17-Nov-2021 10:25:33

1K+ Views

Let us begin by understanding what SSH is.SSHSSH represents Secure Shell or Secure Socket Shell. It is a cryptographic system protocol that enables two computers to connect and send the data over an insecure network including the internet. It can log in to a remote server to implement commands and data transfer from one device to another device.The SSH protocol was established by SSH communication security Ltd to safely connect with the remote device. Secure communication supports powerful password authentication and encrypted connection with a public key over an insecure medium. It can restore unprotected remote login protocols including Telnet, ... Read More

What are Cookies?

Ginni
Updated on 17-Nov-2021 10:23:49

2K+ Views

A cookie is a part of data from a website that is saved inside a web browser that the website can fetch at a later time. Cookies are used to communicate the server that users have restored to a specific website. When users restore to a website, a cookie provides data and enables the site to show selected settings and targeted content.Cookies also store data including shopping cart contents, registration or login credentials, and client preferences. This is completed so that when users revisit sites, any data that was supported in an earlier session or any set preferences can be ... Read More

What is Winternitz One Time Signature Scheme?

Pranav Bhardwaj
Updated on 05-Nov-2021 11:27:51

416 Views

Winternitz One Time Signature SchemeRobert Winternitz proposed the W-OTS approach. It is thought to be quantum resilient since it uses modest key and signature sizes.It generates 32 ☓ 256 bit random private keys in total.We then have this a number of times, and a parameter (W) is used to define them.We can hash the private keys by using W = 8(2W).It generates public keys with a length of 32 256-bitsThe signature is formed by taking 8-bits at a time, subtracting the 8-bit binary int (n) from 256, then hashing the private key 256 times.Thereafter, the signature is made up of ... Read More

What is Digital Service Unit (DSU)?

Pranav Bhardwaj
Updated on 05-Nov-2021 11:25:47

1K+ Views

Digital Service UnitA Digital Service Unit (DSU) is a piece of hardware that connects a Local Area Network (LAN) to an external communication carrier service via a Channel Service Unit (CSU).A DSU is a device with two or more ports, one designated as the WAN port and the other as the DTE port.The device translates bipolar digital signals from a digital circuit and a CSU that is compatible with the data terminal equipment to which the data is transferred.When information is sent from the DTE to the circuit, the DSU performs a similar operation in reverse.The telecommunications service that a ... Read More

Dynamic Domain Name System (DDNS) in Application Layer

Pranav Bhardwaj
Updated on 05-Nov-2021 11:24:50

4K+ Views

What is DDNS?The Dynamic Domain Name System (DDNS) is a protocol that provides DNS extensions that allow DNS servers to accept requests to dynamically add, update, and delete entries in the DNS database.A DDNS server can serve both static and dynamic domains at the same time, since DDNS is a functional superset of existing DNS servers.Rather than allowing any server to change its DNS records, the secure version of DDNS authenticates update requests from DDNS hosts using critical public security and digital signatures.Dynamic DNS was created to address the problem of frequent IP changes. For example, when you search for ... Read More

What is AAA (Authentication, Authorization, and Accounting)?

Pranav Bhardwaj
Updated on 05-Nov-2021 11:23:31

2K+ Views

Authentication, Authorization, and AccountingAuthentication, Authorization, and Accounting (AAA) is a structural framework for gaining access to computer resources, enforcing policies, auditing, providing critical information for service invoicing, and other network administration and security procedures.This procedure is mostly used to allow specified and valid users access to network and software application resources.In relation to the network protocol RADIUS, the AAA notion is frequently utilized.Authentication, authorization, and accounting (AAA) is a method for tracking and regulating user access to network resources on an IP-based network. AAA is frequently set up as a dedicated server.The practice of adding or denying individual users access ... Read More

What is a Shielded Twisted Pair (STP) cable?

Pranav Bhardwaj
Updated on 05-Nov-2021 11:22:17

4K+ Views

Shielded Twisted PairIBM invented the shielded twisted pair (STP) cable for token ring networks, including two independent wires coated in a foil shielding that prevents electromagnetic interference and speeds up data transmission.STP cables are protected with additional foil or copper knitting jackets to help protect cable signals from interference.STP cables are more expensive than UTP cables but can transmit data at higher prices over longer distances.Electromagnetic interference does not seep out of or into STP cable because of the additional coverageEthernet networks, particularly fast-data-rate Ethernets, frequently use STP cables.The efficiency of the additional covering depends on the following features of ... Read More

What is Multiple Spanning Tree Protocol (MSTP)?

Pranav Bhardwaj
Updated on 05-Nov-2021 11:20:44

2K+ Views

Multiple Spanning Tree ProtocolMultiple Spanning Tree Protocol (MSTP) is an algorithm that enables easy and full connectivity provided to any Virtual LAN (VLAN) across an Integrated Area Network.MSTP uses Bridge Protocol Data Units (BPDUs) to transmit information to tree-related devices by identifying practical ways to prevent loopholes in the MSTI (Multiple Spanning Tree Instance) and CIST (Common and Internal Spanning Tree). This is done in the same way as the STP was designed, but without the need to enable support links and without the risk of bridge loops.In addition, MSTP allows frames/packets allocated to different VLANs to take different routes ... Read More

Difference between RIP and OSPF

Pranav Bhardwaj
Updated on 05-Nov-2021 11:14:19

4K+ Views

Routing Information Protocol (RIP)The Routing Information Protocol (RIP), which uses the hop count as a routing measure, is one of the oldest distance-vector routing technologies. RIP eliminates routing loops by restricting the number of hops permitted in a path from source to destination.RIP permits a maximum of 15 hops, which limits the size of networks that can be supported by the protocol.It also employs split horizon, route poisoning, and hold-down techniques to restrict the spread of incorrect routing information.RIP is not the preferred routing protocol in most networking setups since its time to converge, and scalability is inferior to EIGRP; ... Read More

Virtual Circuit in Computer Network?

Pranav Bhardwaj
Updated on 05-Nov-2021 11:11:42

2K+ Views

A virtual circuit (VC) transfers data via a packet-switched network that makes it look like the source and destination end systems of the data are connected by a dedicated physical link. The terms "virtual circuit" and "virtual connection" are interchangeable.A "call setup" must be established between two or more nodes or software programs before a connection or virtual circuit can be used.A bit stream or byte stream may then be sent between the nodes. As a result, a virtual circuit protocol permits higher-level protocols to avoid dealing with data division into Protocol data units.This network is a very dependable means ... Read More

Advertisements