Found 1112 Articles for Internet

What is router architecture?

Bhanu Priya
Updated on 15-Sep-2021 08:30:47

11K+ Views

Router architecture is designed in a way that the routers are equipped to perform two main functions. These functions are as follows:Process routable protocols.Use routing protocols to determine the best path.Let us try to understand the router with the help of architecture:Architecture of RouterGiven below is a diagram which explains the architecture of router:The different factors which help in successful functioning of router are explained below:Input PortThe input port performs many functions. The physical layer functionality of terminating an incoming physical link to a router it can perform.It performs the data link layer functionality needed to interoperate with the data ... Read More

What is Basic Communication Model?

Bhanu Priya
Updated on 15-Sep-2021 08:24:20

14K+ Views

The basic communication model in computer networking is where the Sender (encodes the message) channel sends a message over a channel or medium and receiver (decodes the message) gives Feedback.ComponentsThe components involved in the successful implementation of the basic communication model are as follows −Sender − Who sends the message.Encodes − Translates messages into symbols like words, pictures, sound, etc.Channel or medium − It used to transmit messages. Some channels are face-to-face communication, over telephone, letters, television, newspapers, radio, etc.Decode − Receiver decodes these symbols to understand what the sender wants to say.Receiver − A person who receives the message.Feedback ... Read More

What are the network security types?

Bhanu Priya
Updated on 15-Sep-2021 08:23:00

291 Views

Network security is protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized change to the system.Importance of network securityThe importance of network security is explained below −Confidentiality − Confidentiality is probably the common aspect of information security. We need to protect our confidential information through network security. An organization needs to guard against those malicious actions that endanger the confidentiality of its information.Integrity − Information’s needs to be changed constantly. To keep changes secure we need network security.Availability − The third-party component of information security is called availability. The information created and ... Read More

What is VLAN in a computer network?

Bhanu Priya
Updated on 15-Sep-2021 08:21:31

3K+ Views

A virtual local area network (virtual LAN) is the logical grouping of network nodes.In other words, a virtual LAN is any broadcast domain that is partitioned and isolated in a network. A VLAN allows several networks to work virtually as one LAN.It gives an advantage to connect multiple devices whether it is wired or wireless to a combined single network. It works as a broadcast domain.Benefits of VLANThe benefits that are provided by implementing VLANs are as follows −Reduce the number of routers.All devices can be controlled by the same level.It offers a broadcast domain that reduces the traffic.It gives ... Read More

What is the Default Gateway?

Bhanu Priya
Updated on 15-Sep-2021 08:20:27

3K+ Views

A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway is to pass the information to another router when the current packet does not know the destination.It is a node or a router in the network that connects the host to remote network components.Whenever a packet needs to be transmitted to another network, the packet must pass through the default ... Read More

What is the role of NAT and PAT in making internet routing more efficient?

Bhanu Priya
Updated on 15-Sep-2021 08:18:50

740 Views

The two address translations that are helpful to make internet routing more efficient are NAT (Network address translation) and PAT (Port address translation).Let us discuss the two translation schemes.Network Address Translation (NAT)NAT is used to convert a private IP address into a public IP address and also a public IP address into a private IP address. We use NAT due to the shortage of IP addresses.IP Version 4 is a 32- bit address and it has almost 4.3 billion IP addresses, but the population of the world is much higher and it is approximately about 7.8 billion as of the ... Read More

What are network based attacks and network security threats?

Bhanu Priya
Updated on 15-Sep-2021 08:16:04

862 Views

Let us begin by understanding what network based attacks are.Network based attacksThe different network-based attacks are as follows −SniffingIn this type of network attack, packets of data are captured and monitored by the hacker. These packets flow between server and client. The attacker intercepts the network to read them.This can actually lead to damage to the data in the organization. This is because it may lead to compromise of private information of the employees, etc.EavesdroppingIn this type of attack, passive activities are performed on the network. The attacker starts to listen to the data flowing between various networks and extract ... Read More

What are risks in implementing the RSA algorithm without padding?

Bhanu Priya
Updated on 15-Sep-2021 08:15:02

1K+ Views

The RSA algorithm stands for Rivest-Shamir-Adelman algorithm. RSA algorithm is the most commonly used public key algorithm and this algorithm can be used both for encryption and for signing.RSA uses a variable size encryption block and variable size key. The key pair is derived from a very large number say n that is the product of two large prime numbers selected through special rules.The public key includes n and derives one of the factors of n, an adversary cannot determine the prime factor of n, from this information alone, makes the RSA algorithm so secure.Hence, it is generally considered to ... Read More

What are the ways of security implementation in storage networks?

Bhanu Priya
Updated on 15-Sep-2021 08:14:01

546 Views

The different ways of security implementations in storage network includes the following −An overall IT and security risk assessment study has been completed including threat probabilities and overall business impacts.This will set a context and basis to develop a credible storage network security plan.Overall IT security objectives and advised spending levels and budgets are in place so that a storage security plan can be developed in context.Requirements for compliance reporting have been established so that the storage network security implementations can give the overall reporting system.Types of Storage network security implementationsAccordingly, there are three types of storage network security implementations ... Read More

What are issues and solutions related to TCP in networks?

Bhanu Priya
Updated on 15-Sep-2021 08:12:47

708 Views

Some the issues and solution related to Transmission Control Protocol (TCP) are as follows −Silly window syndrome.Congestion window management.Silly Window SyndromeThis is a problem which arises in TCP flow control. In this the sender window size shrinks to an extremely low value due that the data being sent in each trip is even smaller than the TCP header. Due to which TCP protocol becomes extremely inefficient.CausesThe silly window syndrome can occur due to two main reasons, which are as follows −The application which needs to send the data produces a short amount of data (1 byte), again and again and ... Read More

Advertisements