Found 1112 Articles for Internet

What are the new developments of cellular networks?

Bhanu Priya
Updated on 15-Sep-2021 07:56:16

233 Views

Cellular network is fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.It is not a complete wireless technology because the cellular network refers to a large area of mobile networks that is used for network access.A mobile device is linked to its base station using an air-based interface and also using a physical and link layer protocol.Every base station is connected to the Mobile Switching Centre to help set up a ... Read More

What is evolutionary process of cellular networks?

Bhanu Priya
Updated on 15-Sep-2021 07:54:56

2K+ Views

Cellular network is fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.EvolutionPrior to the advent of cellular technology, there were few mobile telephone systems in the late 1940s such as car-based telephone systems. The push to talk technique was used here. Later, Mobile Telephone System (MTS) and Improved MTS (IMTS) were introduced to support a larger number of mobile stations.In 1979, the first 1G cellular network was launched in Japan. In ... Read More

Differentiate between 4G and 5G cellular Networks

Bhanu Priya
Updated on 15-Sep-2021 07:53:03

742 Views

Cellular network is a fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.4G cellular network4G is referred as the 4th Generation to the cellular network technology which flourished over 3G. It has the International Telecommunication Union (ITU) in International Mobile Telecommunications (IMT) Advanced. This comprises IP telephony, Gaming services, high-definition mobile TV, video calling, Television in 3D etc.5G cellular network5Gs are the wireless network technologies which includes the millimetre wave bands ... Read More

What are security features and risks in cellular 4G networks?

Bhanu Priya
Updated on 15-Sep-2021 07:51:32

1K+ Views

4G cellular network is the 4th generation of cellular communications.Features of 4G4G cellular network comes up with many features as follows −10x high speed as compared to 3GThe cost is also less for each bit used.It is highly secured too.It comes up with LTE i.e. Long term evaluation which refers to high-speed data connection for mobile devices.Security FeaturesSecurity features of 4G cellular networks are the different types of security measures a 4G network possesses. These security features are explained below −Configuration of security − It is the most beautiful feature of the 4g network that a user can check that ... Read More

What are cryptography, symmetric and public key algorithms?

Bhanu Priya
Updated on 15-Sep-2021 07:50:13

5K+ Views

Let us begin by understanding what cryptography is.CryptographyIt is a technique of writing in a secret code which is in an unreadable format to the third parties. Plaintext indicates the data which is in the readable format and also which is not encrypted.The plaintext is converted into cipher text which is in the format of unreadable with the help of the encryption and again it is to be converted into plaintext with the help of the decryption. Both the encryption and the decryption are done with the help of the scheme of the cryptography.Functions of cryptographyThe functions of cryptography are ... Read More

Differentiate between SSL and TSL secure layers

Bhanu Priya
Updated on 15-Sep-2021 07:45:21

407 Views

Secure Socket Layer (SSL) and Transport security layer (TSL) are internet security protocols used for secured communication between the web-browser and the webserver. SSL is the predecessor of TLS so logically TLS is more secure than SSL.DifferencesLet us discuss the differences between SSL and TSL in point wise manner −Point 1TLS establishes communication in two steps.Step 1 − Handshaking to authenticate the server &Step 2 − Actual message transfer.So, it’s slower than SSL.Point 2TLS is based on the SSL v3.0 protocol with some enhancements.SSL was developed with communication needs and related issues.Point 3TLS v1.0 is prone to BEAST attacks but ... Read More

What is ESP in tunnel and transport mode and the difference between AH and ESP?

Bhanu Priya
Updated on 15-Sep-2021 07:42:58

4K+ Views

Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used to hide the message content against data tampering.IPSec provides an open framework, such as SHA and MD5 for implementing industry standard algorithms.Encryption/decryption allows only the sender and the authorized receiver to make the data to be received in readable form and only after the integrity verification process is complete, the ... Read More

What is Encapsulating Security Payload(ESP)?

Bhanu Priya
Updated on 13-Sep-2021 13:16:58

9K+ Views

Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used to hide the message content against data tampering.IPSec provides an open framework, such as SHA and MD5 for implementing industry standard algorithms.Encryption/decryption allows only the sender and the authorised receiver to make the data to be received in readable form and only after the integrity verification process is complete, the ... Read More

What is Authentication Header (AH) format?

Bhanu Priya
Updated on 13-Sep-2021 13:14:52

11K+ Views

Authentication Header (AH) is used to provide integrity and authentication to IP datagrams. Replay protection is also possible. The services are connectionless, that means they work on a per-packet basis.AH is used in two modes as follows −Transport modeTunnel modeAH authenticates are the same as IP datagram. In transport mode, some fields in the IP header change en-route and their value cannot be predicted by the receiver. These fields are called mutable and they are not protected by AH.Mutable IPv4 fieldsThe mutable IPv4 fields are as follows −Type of service (TOS)FlagsFragment offsetTime to live (TTL)Header checksumTo protect these fields, tunnelling ... Read More

What is IPsec in computer networks?

Bhanu Priya
Updated on 13-Sep-2021 13:11:27

3K+ Views

IP Security (IPSec) is a collection of protocols which is designed by Internet Engineering Task Force (IETF) to provide security for a packet at the network level. It helps to create confidential and authenticated and packets for the IP layer as shown in below diagram −IPSec protocol aim is to provide security services for IP packets like encrypting sensitive data/packets, authentication, and protection against replay and data confidentiality. It can be configured to operate in two different modes −Tunnel ModeTransport mode.The original packet is generated as follows −IP HeaderUDP HeaderDataLet us discuss each mode in detail.Tunnel modeIPSec tunnel mode is ... Read More

Advertisements