Found 166 Articles for Technology

Explicitly assigning port number to client in Socket

Satish Kumar
Updated on 29-Sep-2023 12:55:42

296 Views

Introduction When building client-server applications using sockets, it's essential to assign a unique port number to each client to ensure proper communication between server and clients. By explicitly assigning a port number to each client, server can identify and communicate with individual clients without confusion or overlap. In this article, we'll explore importance of assigning port numbers to clients and how to do so effectively. What is a port number? In context of networking, a port number is a 16-bit unsigned integer that uniquely identifies a specific process to which a network packet is directed. When a client sends a ... Read More

Explain Parameter passing Semantics in RPC

Satish Kumar
Updated on 29-Sep-2023 12:41:04

486 Views

Remote Procedure Call (RPC) is a communication protocol that enables a process running on one computer to invoke a procedure in another process running on a remote computer. procedure call appears to caller as a local procedure call, but in reality, call is transmitted over a network. RPC involves several aspects such as marshaling of parameters, handling of return values, and communication between client and server. In this article, we will focus on parameter passing semantics in RPC. We will discuss various parameter passing methods and their characteristics, including pass-by-value, pass-by-reference, pass-by-result, and pass-by-object-reference. We will also provide examples to ... Read More

Ethernet Transmitter Algorithm

Satish Kumar
Updated on 27-Sep-2023 15:05:38

159 Views

Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data is transmitted over Ethernet network. In this article, we will discuss Ethernet transmitter algorithm, its subheadings, and examples. Overview of Ethernet Transmitter Algorithm The Ethernet transmitter algorithm is a set of rules that governs transmission of data packets over an Ethernet network. algorithm ensures that data packets are transmitted in ... Read More

EtherChannel in Computer Network

Satish Kumar
Updated on 27-Sep-2023 14:53:54

221 Views

Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique used in computer networks to combine multiple physical links into a logical link. goal is to increase available bandwidth and provide redundancy, fault tolerance, and load balancing. In an EtherChannel, multiple physical links are bundled together, appearing as a single logical link to network devices connected to it. Benefits of ... Read More

Adaptive security appliance (ASA) features

Satish Kumar
Updated on 27-Sep-2023 14:48:07

100 Views

In today's digitally connected world, security is a critical concern for organizations of all sizes. With rise of cyber attacks, it has become imperative to implement security measures that not only provide protection but also adapt to evolving threats. One such security measure is Adaptive Security Appliance (ASA). An Adaptive Security Appliance is a security device that is designed to protect network infrastructure by providing advanced security features such as firewall, VPN, and intrusion prevention system (IPS) capabilities. ASA offers a range of features that provide an effective defense against cyber threats, making it a popular choice for organizations seeking ... Read More

Active Directory PenTesting

Satish Kumar
Updated on 27-Sep-2023 14:43:23

481 Views

In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be tested is organization's Active Directory (AD). This article will discuss Active Directory pen testing, why it is essential, and some examples of AD vulnerabilities. What is Active Directory? Active Directory is a directory service developed by Microsoft for managing and organizing information about users, computers, and other resources in a ... Read More

Access Networks

Satish Kumar
Updated on 27-Sep-2023 14:34:42

492 Views

Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired access networks are a type of computer network infrastructure that uses physical cables or wires to connect devices to internet or a local network. They are typically installed in buildings or homes to provide a stable and reliable connection to internet or other devices within network. Wired access networks have ... Read More

Access Lists (ACL)

Satish Kumar
Updated on 27-Sep-2023 14:24:43

246 Views

In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ... Read More

Access Control Tactics in Computer Networks

Satish Kumar
Updated on 27-Sep-2023 13:36:09

257 Views

In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources in a computer network. This article explores access control tactics in computer networks, including their types and examples. Types of Access Control Tactics Access control tactics can be broadly classified into two types − physical access control and logical access control. Physical Access Control Physical access control is a security ... Read More

A Model for Network Security

Satish Kumar
Updated on 27-Sep-2023 12:02:42

2K+ Views

Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can be used by organizations to protect their networks. Understanding Threat Landscape Before implementing a network security model, it is important to understand threat landscape. Cyber attackers can use a variety of techniques to compromise a network, including − Malware Malware is malicious software that is designed to damage, disrupt ... Read More

Advertisements