- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1301 Articles for MCA
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
2K+ Views
Wide area network (WAN) is a telecommunication network that spreads over a large area of computer networking. A WAN network connects different small LAN and MAN networks.A well-known example of a WAN network is the Internet. It covers cities, states, countries and even continents. It can be a public network or a private network.WAN Network TechnologiesThere are two technologies which are used in the WAN network design. These technologies are explained below −Circuit SwitchingCircuit switched networks work on the principle of virtual connection that means all the messages will follow the same path and resources in this path are reserved ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
7K+ Views
Transmission Control Protocol/Internet Protocol (TCP/IP) are two different communication protocols. TCP defines the communication in a network and how to send data in the form of packets. IP manages how to make the route for packets to make sure it reaches its defined destination. Before data is sent its IP address is checked then it is determined where to forward the data.TCP/IP uses the same model as the OSI model. It uses the client/server model type of communication where a user or machine (a client) is provided a service by another computer (a server) in the network.TCP/IP has four layers ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
19K+ Views
Transmission Control Protocol/Internet Protocol (TCP/IP) are two different communication protocols. TCP splits a message to packets which were transmitted across the internet whereas the IP is accountable to address of every packet hence a chance to forward the exact destination.Previously, there was no TCP/IP and no method for the computers to perform effortlessly over public networks. The main function of TCP/IP is that it governs how the information is sent and received in the form of packets between source and destination.So in short, we can say that TCP defines the communication in a network and how to send data in ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
1K+ Views
Firewall in general is defined as a wall between personal computer and outside world. So it will filter the traffic coming from the outside world based on the user configuration like which sites are trusted sites and which we need to allow.Example of firewall system design is shown below −Components of a Firewall SystemThe components of firewall system are explained below −Perimeter RouterIt is used to provide a link to the public networking system like the internet, or a distinctive organization. It performs the routing of data packets with the help of an appropriate routing protocol. It also provides the ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
843 Views
Firewall is a wall between a personal computer and the outside world. So it will filter the traffic coming from the outside world based on the user configuration like which sites are trusted sites and which we need to allow.The diagram given below depicts the firewall:Functions of firewallThe functions of a firewall in computer networking are as follows −Block unsafe URLs.Close down a port completely.Open a port to only specific IP addresses.Allow some ip addresses at specific times.Advantages of Hardware FirewallThe advantages of a hardware firewall are as follows −Hardware firewalls can protect your entire network with a single firewall.Hardware ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
11K+ Views
Router architecture is designed in a way that the routers are equipped to perform two main functions. These functions are as follows:Process routable protocols.Use routing protocols to determine the best path.Let us try to understand the router with the help of architecture:Architecture of RouterGiven below is a diagram which explains the architecture of router:The different factors which help in successful functioning of router are explained below:Input PortThe input port performs many functions. The physical layer functionality of terminating an incoming physical link to a router it can perform.It performs the data link layer functionality needed to interoperate with the data ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
14K+ Views
The basic communication model in computer networking is where the Sender (encodes the message) channel sends a message over a channel or medium and receiver (decodes the message) gives Feedback.ComponentsThe components involved in the successful implementation of the basic communication model are as follows −Sender − Who sends the message.Encodes − Translates messages into symbols like words, pictures, sound, etc.Channel or medium − It used to transmit messages. Some channels are face-to-face communication, over telephone, letters, television, newspapers, radio, etc.Decode − Receiver decodes these symbols to understand what the sender wants to say.Receiver − A person who receives the message.Feedback ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
291 Views
Network security is protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized change to the system.Importance of network securityThe importance of network security is explained below −Confidentiality − Confidentiality is probably the common aspect of information security. We need to protect our confidential information through network security. An organization needs to guard against those malicious actions that endanger the confidentiality of its information.Integrity − Information’s needs to be changed constantly. To keep changes secure we need network security.Availability − The third-party component of information security is called availability. The information created and ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
3K+ Views
A virtual local area network (virtual LAN) is the logical grouping of network nodes.In other words, a virtual LAN is any broadcast domain that is partitioned and isolated in a network. A VLAN allows several networks to work virtually as one LAN.It gives an advantage to connect multiple devices whether it is wired or wireless to a combined single network. It works as a broadcast domain.Benefits of VLANThe benefits that are provided by implementing VLANs are as follows −Reduce the number of routers.All devices can be controlled by the same level.It offers a broadcast domain that reduces the traffic.It gives ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
3K+ Views
A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway is to pass the information to another router when the current packet does not know the destination.It is a node or a router in the network that connects the host to remote network components.Whenever a packet needs to be transmitted to another network, the packet must pass through the default ... Read More