![Trending Articles on Technical and Non Technical topics](/images/trending_categories.jpeg)
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Bhanu Priya has Published 1581 Articles
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
285 Views
Network security is protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized change to the system.Importance of network securityThe importance of network security is explained below −Confidentiality − Confidentiality is probably the common aspect of information security. We need to protect our ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
3K+ Views
A virtual local area network (virtual LAN) is the logical grouping of network nodes.In other words, a virtual LAN is any broadcast domain that is partitioned and isolated in a network. A VLAN allows several networks to work virtually as one LAN.It gives an advantage to connect multiple devices whether ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
3K+ Views
A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
737 Views
The two address translations that are helpful to make internet routing more efficient are NAT (Network address translation) and PAT (Port address translation).Let us discuss the two translation schemes.Network Address Translation (NAT)NAT is used to convert a private IP address into a public IP address and also a public IP ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
859 Views
Let us begin by understanding what network based attacks are.Network based attacksThe different network-based attacks are as follows −SniffingIn this type of network attack, packets of data are captured and monitored by the hacker. These packets flow between server and client. The attacker intercepts the network to read them.This can ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
1K+ Views
The RSA algorithm stands for Rivest-Shamir-Adelman algorithm. RSA algorithm is the most commonly used public key algorithm and this algorithm can be used both for encryption and for signing.RSA uses a variable size encryption block and variable size key. The key pair is derived from a very large number say ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
545 Views
The different ways of security implementations in storage network includes the following −An overall IT and security risk assessment study has been completed including threat probabilities and overall business impacts.This will set a context and basis to develop a credible storage network security plan.Overall IT security objectives and advised spending ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
704 Views
Some the issues and solution related to Transmission Control Protocol (TCP) are as follows −Silly window syndrome.Congestion window management.Silly Window SyndromeThis is a problem which arises in TCP flow control. In this the sender window size shrinks to an extremely low value due that the data being sent in each ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
3K+ Views
TCP is a transmission control protocol and a connection-oriented protocol. It provides a flow control and error control facility for information in between the sender and the receiver.A protocol which will be used in the data link layer which will support the reliable and sequential delivery of data frames. This ... Read More
![Bhanu Priya](https://www.tutorialspoint.com/assets/profiles/314653/profile/60_78287-1615027882.jpg)
Bhanu Priya
639 Views
Let us begin by understanding the concept of flooding.FloodingFlooding does not require any network information like topology, load condition and cost of different paths.Here, every incoming packet to a node is sent out on every outgoing line except the one it arrived on.In this case all possible routes between Source ... Read More