Found 75 Articles for Server

What are the TCP/IP Ports and its applications?

Bhanu Priya
Updated on 24-Mar-2022 13:17:37

8K+ Views

Port is a logical address of any protocol or we can call it a dedicated door for each protocol in which all the packets fall in that box. We can also say that the mailbox for each protocol is a box in which each protocol packet is dropped.Later on the receiver will open that packet and read the content which the sender has sent. Port is a dedicated separate line for packet transmission for each protocol.TCP is called as Transmission control protocol which provides a communication service between an application program and the Internet protocol (IP)A port is a number ... Read More

What are the differences between Non-persistent and p-Persistent CSMA?

Bhanu Priya
Updated on 21-Mar-2022 13:05:57

2K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMAp-persistent CSMAThe p-persistent CSMA is used whenever the channel has time slots so that the time slot duration is equal to or greater than the maximum propagation delay time. The p-persistence senses the channel whenever a station becomes ready to send.Suppose if the channel is busy, then the station has to wait till the next slot is available.The p-persistence transmits with a probability p when the channel is idle. With a probability q=1-p, the station has to wait for the beginning of the ... Read More

What is NBP?

Bhanu Priya
Updated on 21-Mar-2022 12:38:48

306 Views

The Name Binding Protocol (NBP) allows you to bind a name to the internal storage address of the entity and register that mapping so that other entities can follow.An NBP name was displayed by the applications to the users and used addresses internally to locate entities. When we register the entity's name and address, NBP validates its uniqueness.Generally, an entity name consists of three fields, which are as follows −The object − Object field is used to identify the user of the system. Because of the applications this value is set to the owner name, where the user specifies with ... Read More

What is Transport Layer Security (TLS) Handshake?

Bhanu Priya
Updated on 21-Mar-2022 12:33:53

6K+ Views

Transport layer security protocol is one of the security protocols which are designed to facilitate privacy and data security for communications over the Internet. The main use of TLS is to encrypt the communication between web applications and servers, like web browsers loading a website.TLS is used to encrypt other communications like email, messaging, and voice over IP (VoIP). TLS was proposed by the Internet Engineering Task Force (IETF), which is an international standards organization.ComponentsThe three main components that TLS accomplishes are as follows −Encryption − It is used to hide the data being transferred from third parties.Authentication − It ... Read More

What are the types of Virtual LAN (VLAN)?

Bhanu Priya
Updated on 21-Mar-2022 12:29:13

4K+ Views

A VLAN is called a subnetwork that can group together devices on separate physical local area networks. A LAN is a group of computers or devices that share a communications line/wireless link to a server within the same geographical area.VLANs provide security on larger networks by allowing a higher degree of control over which devices have access to each other. They are flexible because VALNs are based on logical connections, rather than physical.Working of VLANWhen a switch receives an Ethernet frame, the frame will either already have a VLAN tag or switch will insert a VLAN tag into the Ethernet ... Read More

What are the types of Transmission Technology?

Bhanu Priya
Updated on 21-Mar-2022 12:31:19

6K+ Views

The transmission technologies are divided into two types −Broadcast networks andPoint-to-point networks.Let us begin by learning about broadcast networks.Broadcast NetworksTransmitting data from one source host to all other hosts present in the same or other network is called broadcast. It is called a one to all transmission.Types of broadcastBroadcast is classified into two types, which are as follows −Limited BroadcastTransmitting data from one source host to all other hosts present in the same network is called a limited broadcast. Given below is the diagram of limited broadcast −In Limited Broad casting if the destination address is 255.255.255.255 then the packet ... Read More

What is Internet Relay Chat (IRC)?

Bhanu Priya
Updated on 21-Mar-2022 12:25:13

4K+ Views

The Internet Relay Chat is a protocol used for live interactive internal text messaging or simultaneous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication messages as well as chat and data transfer including file sharing.IRC is the way of communicating in real time with people from all over the world. IRC has separate networks like IRC servers, machines which allow users to connect to IRC.Working of IRCGenerally, the user runs a program to connect to a server on one of the IPC nets.The server relays information to and forms other ... Read More

What is a Proxy Server?

Bhanu Priya
Updated on 21-Mar-2022 11:37:12

807 Views

A proxy server is a computer that offers a service to allow clients to make indirect network connections to the other network services. A client connects to the proxy server, and then requests a connection, file, or other resource available on a different server.Then the proxy provides the required resource either by connecting to the specified server or by obtaining through its cache.AdvantagesThe advantages of a proxy server are as follows −It helps the clients to protect their important information from getting hacked by hackers.The proxy server is also used to enhance the security and privacy level of the client's ... Read More

What is a Distributed Component Object Model (DCOM)?

Bhanu Priya
Updated on 21-Mar-2022 11:27:41

2K+ Views

DCOM is an extension of the Component Object Model (COM). Component Object Model explains how components and their clients interact. This interaction is the way the client and the component can connect without the need of any intermediary system component.Suppose when client and component are present on different machines, DCOM replaces the local Inter-process communication with a network protocol.Neither the client nor the components are aware that the wire that connects them has just become a little longer.The COM run-time provides object-oriented services to clients and components and uses RPC and the security provider to generate standard network packets that ... Read More

What is early token release and delayed token release?

Bhanu Priya
Updated on 21-Mar-2022 11:22:57

459 Views

Token ring is a physical unidirectional ring, where the systems are connected to the ring through some interface.In the token ring a special frame is called a token which is always circulated on the ring. If a system has to transmit then it needs to acquire the token without a token no system can transmit. Only one system can transmit at a time. Hence it is collision free protocol.The token ring source is responsible for removing the frame from the ring. In normal token ring operation, a station sending information holds the token until the sending data circles the entire ... Read More

Advertisements