Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Page 32 of 94
What are the functions of each layer in TCP/IP?
Transmission Control Protocol/Internet Protocol (TCP/IP) are two different communication protocols. TCP splits a message to packets which were transmitted across the internet whereas the IP is accountable to address of every packet hence a chance to forward the exact destination.Previously, there was no TCP/IP and no method for the computers to perform effortlessly over public networks. The main function of TCP/IP is that it governs how the information is sent and received in the form of packets between source and destination.So in short, we can say that TCP defines the communication in a network and how to send data in ...
Read MoreWhat are the different components and architectures of firewalls?
Firewall in general is defined as a wall between personal computer and outside world. So it will filter the traffic coming from the outside world based on the user configuration like which sites are trusted sites and which we need to allow.Example of firewall system design is shown below −Components of a Firewall SystemThe components of firewall system are explained below −Perimeter RouterIt is used to provide a link to the public networking system like the internet, or a distinctive organization. It performs the routing of data packets with the help of an appropriate routing protocol. It also provides the ...
Read MoreWhat is a firewall? What are the advantages of hardware and software firewalls?
Firewall is a wall between a personal computer and the outside world. So it will filter the traffic coming from the outside world based on the user configuration like which sites are trusted sites and which we need to allow.The diagram given below depicts the firewall:Functions of firewallThe functions of a firewall in computer networking are as follows −Block unsafe URLs.Close down a port completely.Open a port to only specific IP addresses.Allow some ip addresses at specific times.Advantages of Hardware FirewallThe advantages of a hardware firewall are as follows −Hardware firewalls can protect your entire network with a single firewall.Hardware ...
Read MoreWhat is router architecture?
Router architecture is designed in a way that the routers are equipped to perform two main functions. These functions are as follows:Process routable protocols.Use routing protocols to determine the best path.Let us try to understand the router with the help of architecture:Architecture of RouterGiven below is a diagram which explains the architecture of router:The different factors which help in successful functioning of router are explained below:Input PortThe input port performs many functions. The physical layer functionality of terminating an incoming physical link to a router it can perform.It performs the data link layer functionality needed to interoperate with the data ...
Read MoreWhat is Basic Communication Model?
The basic communication model in computer networking is where the Sender (encodes the message) channel sends a message over a channel or medium and receiver (decodes the message) gives Feedback.ComponentsThe components involved in the successful implementation of the basic communication model are as follows −Sender − Who sends the message.Encodes − Translates messages into symbols like words, pictures, sound, etc.Channel or medium − It used to transmit messages. Some channels are face-to-face communication, over telephone, letters, television, newspapers, radio, etc.Decode − Receiver decodes these symbols to understand what the sender wants to say.Receiver − A person who receives the message.Feedback ...
Read MoreWhat are the network security types?
Network security is protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized change to the system.Importance of network securityThe importance of network security is explained below −Confidentiality − Confidentiality is probably the common aspect of information security. We need to protect our confidential information through network security. An organization needs to guard against those malicious actions that endanger the confidentiality of its information.Integrity − Information’s needs to be changed constantly. To keep changes secure we need network security.Availability − The third-party component of information security is called availability. The information created and ...
Read MoreWhat is the Default Gateway?
A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway is to pass the information to another router when the current packet does not know the destination.It is a node or a router in the network that connects the host to remote network components.Whenever a packet needs to be transmitted to another network, the packet must pass through the default ...
Read MoreWhat is the role of NAT and PAT in making internet routing more efficient?
The two address translations that are helpful to make internet routing more efficient are NAT (Network address translation) and PAT (Port address translation).Let us discuss the two translation schemes.Network Address Translation (NAT)NAT is used to convert a private IP address into a public IP address and also a public IP address into a private IP address. We use NAT due to the shortage of IP addresses.IP Version 4 is a 32- bit address and it has almost 4.3 billion IP addresses, but the population of the world is much higher and it is approximately about 7.8 billion as of the ...
Read MoreWhat are risks in implementing the RSA algorithm without padding?
The RSA algorithm stands for Rivest-Shamir-Adelman algorithm. RSA algorithm is the most commonly used public key algorithm and this algorithm can be used both for encryption and for signing.RSA uses a variable size encryption block and variable size key. The key pair is derived from a very large number say n that is the product of two large prime numbers selected through special rules.The public key includes n and derives one of the factors of n, an adversary cannot determine the prime factor of n, from this information alone, makes the RSA algorithm so secure.Hence, it is generally considered to ...
Read MoreWhat are the ways of security implementation in storage networks?
The different ways of security implementations in storage network includes the following −An overall IT and security risk assessment study has been completed including threat probabilities and overall business impacts.This will set a context and basis to develop a credible storage network security plan.Overall IT security objectives and advised spending levels and budgets are in place so that a storage security plan can be developed in context.Requirements for compliance reporting have been established so that the storage network security implementations can give the overall reporting system.Types of Storage network security implementationsAccordingly, there are three types of storage network security implementations ...
Read More