Ginni has Published 1580 Articles

What are the Network Security threats and attacks?

Ginni

Ginni

Updated on 04-May-2021 13:42:38

1K+ Views

There are various network security threats and attacks which are explained below−Natural DisastersEarthquakes, floods, lightning, and fire can cause several damages to computer systems. It could include other threats such as riots, wars, and terrorist attacks could be included here. Although they are human-caused threats, they are classified as disastrous.Deleting ... Read More

What is Network Security?

Ginni

Ginni

Updated on 04-May-2021 13:39:57

519 Views

The objective of the network is to send data among its users located locally or remotely. Hence, it is possible that undesired users can hack the web and prove harmful to the network or the user's health.The network administrator should follow a few essential points to provide the network with ... Read More

What is SMTP?

Ginni

Ginni

Updated on 04-May-2021 13:38:28

3K+ Views

SMTP represents Simple Mail Transfer Protocol. SMTP is a set of interaction guidelines that allow the software to transmit electronic mail over the internet, referred to as Simple Mail Transfer Protocol.The main objective of SMTP is used to set up communication rules between servers. The servers have a way of ... Read More

Explain the E-Mail Format in Computer Network.

Ginni

Ginni

Updated on 04-May-2021 13:35:40

4K+ Views

E-mail is represented as the transmission of messages on the Internet. It is one of the most commonly used features over communications networks containing text, files, images, or other attachments.Format of E-mail− An e-mail includes three parts that are as follows−E-mail EnvelopeIn modern e-mail systems, there is a distinction made ... Read More

What is an Electronic Mail (E-Mail)?

Ginni

Ginni

Updated on 04-May-2021 13:30:53

11K+ Views

One of the most famous network services is electronic mail (e-mail). The simple standard mechanism for electronic mail on the internet. The first email systems simply consisted of file transfer protocols.But some of the limitations of this system were as follows−Sending a message to a group of people was inconvenient.Messages ... Read More

What is the TFTP Operation?

Ginni

Ginni

Updated on 04-May-2021 13:27:49

549 Views

TFTP operation is very simple. The client sends a read or write request at the server's UDP port 69. The server accepts the request by sharing data messages in case of the read request and sending acknowledgement in the write request. In either case, the server chooses a UDP port ... Read More

What are the FTP Operations?

Ginni

Ginni

Updated on 04-May-2021 13:19:04

782 Views

When using File Transfer Protocol (FTP), the user implements some or all of the following operations −Connecting to a remote hostTo implement a file transfer, the user begins by logging into the remote host. Four commands are used.Open selects the remote host and sets up the login session.User recognizes the ... Read More

What is FTP?

Ginni

Ginni

Updated on 04-May-2021 13:10:33

2K+ Views

FTP represents File transfer protocol and it is a standard internet protocol supported by TCP/IP used for transmitting the files from one host to another. FTP needs TCP as a transport protocol to help the reliable end to end connections and executes two types of connections in managing data transfers.The ... Read More

Explain the functions of Presentation Layer.

Ginni

Ginni

Updated on 04-May-2021 13:04:37

374 Views

The functions of the presentation layer are as follows:It provides the users with a way to execute the session service primitives. For that, it uses the contexts, each consisting of some data types and their transfer syntaxes. When a session is established, the peer entities negotiate for one or more ... Read More

What is Presentation Layer?

Ginni

Ginni

Updated on 04-May-2021 13:02:47

1K+ Views

The sixth layer of the OSI reference model is the presentation layer. This layer is concerned with the issue relating to the external data representation. It is up to the session layer that we have assumed the user data as a string of bits, and we have discussed the conditions ... Read More

Advertisements