Found 1112 Articles for Internet

What is Software Defined Networking (SDN)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:50:19

2K+ Views

SDN technology is a network management technique that allows for dynamic, programmatically efficient network setup to increase network performance and monitoring, making it more like cloud computing than traditional network administration.SDN was created to solve the problem that old networks' static design is decentralized and difficult, but today's networks demand more flexibility and ease of troubleshooting. By decoupling the forwarding of network packets (data plane) from the routing process, SDN tries to consolidate network intelligence in a single network component (control plane).The control plane is made up of one or more controllers, which are considered the brain of the SDN ... Read More

Synchronous Optical Network (SONET) in Computer Networks

Ayushi Bhargava
Updated on 28-Oct-2021 06:49:04

6K+ Views

SONET is a standardized digital communication protocol that uses a fiber optic medium to transfer huge amounts of data across great distances. Multiple digital data streams are transmitted via optical fiber at the same time utilizing LEDs and laser beams in SONET.Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) are established protocols that use lasers or highly coherent light from light-emitting diodes to transport multiple digital bit streams simultaneously across optical fiber (LEDs). Data can also be transmitted over an electrical link at modest transmission rates. The technique was created to replace the plesiochronous digital hierarchy (PDH) system for ... Read More

Types of Information Systems

Ayushi Bhargava
Updated on 28-Oct-2021 06:33:49

6K+ Views

What is an Information System?A formal, sociotechnical organizational system designed to gather, process, store, and disseminate information is known as an information system (IS). Information systems comprise four components from a sociotechnical standpoint − task, people, structure (or roles), and technology.Information systems consist of members that gather, store, and process data, with the data being utilized to give information, add to knowledge and create digital products that aid decision-making.Organizational levels, data mode, processing, system objectives, and type of assistance given are all used to classify information systems.Types of Information SystemThe following images shows the types of Information Systems −Transaction Processing ... Read More

Transition from IPv4 to IPv6 address

Ayushi Bhargava
Updated on 28-Oct-2021 06:32:48

2K+ Views

Many companies have prioritized migration to IPv6 since there is practically no inventory of IPv4 addresses left. However, switching to IPv6 without a lengthy transition procedure is next to impossible. This is due to the fact that IPv6 has never been backward compatible with IPv4. This implies that when hosts and routers are upgraded to IPv6, the old system continues to function alongside the new one without requiring any additional adjustments.Network Transition from IPv4 to IPv6Here are a few techniques for easing the transition between IPV4 and IPV6 systems to tackle the problem of interoperability.Dual-stackWhen switching from IPv4 to IPv6, ... Read More

What is Sybil Attack in Computer Networks?

Ayushi Bhargava
Updated on 28-Oct-2021 06:31:36

207 Views

A Sybil Attack subverts a network service's reputation system by establishing a large number of pseudonymous identities and using them to wield disproportionately great power. It's called after Sybil, the protagonist of the novel Sybil, which is a case study of a lady diagnosed with a dissociative identity disorder. Sock puppetry is another term for Sybil assaults.In computer security, a Sybil Attack is a method of subverting a reputation system by establishing numerous identities. The vulnerability of a reputation system to a Sybil attack is determined by how cheap identities can be generated and the extent to which the reputation ... Read More

Voice Biometric Technique in Network Security

Ayushi Bhargava
Updated on 28-Oct-2021 06:30:32

156 Views

BiometricsBody measurements and computations linked to human traits are referred to as biometrics. Biometric authentication is a type of identification and access control used in computer science. It's also used to track down individuals in groups that are being watched.Individuals are labeled and described using biometric identifiers, which are unique, quantifiable traits. Physiological features, which are connected to the form of the body, are commonly used to classify biometric identifiers. A few examples are Fingerprints, palm veins, facial recognition, DNA, palm print, hand geometry, iris identification, retina, and odor/scent.Customers may "speak on the dotted line" with Vocal Biometrics, which is ... Read More

Various Failures in Distributed Systems

Ayushi Bhargava
Updated on 28-Oct-2021 06:29:21

4K+ Views

Restoration failure can be a complicated issue, especially for distributed systems, where there may be multiple participating devices and multiple failure points. It is very instructive to find different roles in the program and ask each one, "What would happen if that part of the program failed?" Designing a reliable system that can recover from failure requires identifying the types of failure the system must deal with.In a distributed system, we need to deal with mainly four types of failures −Transaction failure (abortion), Site (program) failure, Media (disk) failure, andCommunication line failure.Some of these are due to hardware, and some ... Read More

Wraparound Concept and TCP Sequence Number

Ayushi Bhargava
Updated on 28-Oct-2021 06:28:07

1K+ Views

What is TCP?The Transmission Control Protocol (TCP) is a network communication protocol that allows data packets to be sent across the Internet.TCP is an OSI transport layer protocol used to connect remote computers by conveying and ensuring message delivery through supporting networks and the Internet.Transmission Control Protocol is a member of the Internet protocol suite, sometimes known as the TCP/IP suite, and is one of the most widely used protocols in digital network communications.TCP is primarily used to assure end-to-end data delivery between different nodes.TCP operates in tandem with Internet Protocol, which determines the logical location of the remote node, ... Read More

What are Long-Polling, Websockets, Server- Sent Events (SSE) and Comet?

Ayushi Bhargava
Updated on 28-Oct-2021 06:27:05

495 Views

Long-Polling, Websockets, Server-Sent Events (SSE), and Comet are some of the ways for the client-side to connect with the server-side in real-time. These are discussed in the next paragraphs.Long PollingThis is a technique in which a client asks for information from a server but does not anticipate a response right away. It entails sending an HTTP request to a server and then leaving the connection open to allow the server to reply later. The server enables about 6 simultaneous connections from the browser using extended polling.In comparison to other methods, load balancing is simple in this case. Long polling is ... Read More

Web Caching and Conditional GET Statements

Ayushi Bhargava
Updated on 28-Oct-2021 06:25:30

1K+ Views

What is Web Caching?The activity of saving data for reuse, such as a copy of a web page supplied by a web server, is known as web caching.It is cached or saved the first time a user accesses the page, and a cache will deliver the copy the next time a user requests the same page, preventing the origin server from becoming overwhelmed.Web caching techniques dramatically improve page delivery speed and reduce the amount of work required of the backend server.Caching servers can be configured to refresh at predetermined intervals or in response to specified events to guarantee that only ... Read More

Advertisements