What is Stateful Inspection

Pranavnath
Updated on 12-Apr-2023 15:58:52

249 Views

Stateful inspection is a technique used to restrict the traffic flow between networks. It will observe the live connections in the network and based on it, it allows and restricts the packet’s access based on the security policies. It most key element in tracing is the state of network sessions. Accessibility depends on the session state. ‘Dynamic Packeting Filtering’ is the other name. And this technology is related to a firewall so it restricts accessibility through the firewall. The state specifies the process status and the context is the content or data of the packet including the IP address ... Read More

What is Router?

Pranavnath
Updated on 12-Apr-2023 15:56:52

1K+ Views

A router is an electronic device that connects two or more computer networks and forwards data packets between them. It is an essential component of any modern network infrastructure, from small home networks to large enterprise networks. It does so much customizable filtering when a message passes through the router. If the router admin wishes to block some domain names he can customize them. There are so many such customizations that can be made on the router level. In this article, we will explore what a router is, how it works, and its various types and applications. Definition Routers are ... Read More

What is Remote Code Execution (RCE)

Pranavnath
Updated on 12-Apr-2023 15:55:39

426 Views

Remote code execution(RCE) is an arbitrary code running on a remote system using security vulnerability and connecting it to a private or public network. Physical access is not required. The RCE can have severe consequences of Malware, loss of data, Service disruption, and ransomware deployment. The RCE vulnerability is exploited by the attacker without any access to the victim's system. When we download malicious software or application then it gives rise to the use of RCE by cyber attackers. The OWASP has recognized Remote procedure code as a vulnerability for cyber attacks. Overview Definition Remote Code Execution is a remote ... Read More

Vegas: A Modified TCP Vegas

Pranavnath
Updated on 12-Apr-2023 15:54:41

318 Views

TCP Vegas is a modified TCP Vegas. It depends on Round Trip Time values on the accurate calculation of Base RTT. The TCP detects congestion that can be avoided at different Stages based on Round Trip Time(RTT). Here A stands for Adaptive. TCP Vegas emphasizes packet delay rather than loss of the packet. The TCP Vegas was first coined by Larry L Peterson and Lawrence Brakmo in 1994. The TCP Vegas has better throughput with less loss of packets by keeping packets in the congestion window to be smaller during the transmission. Definition TCP Vegas is an algorithm that avoids ... Read More

Unknown Facts of Networking

Pranavnath
Updated on 12-Apr-2023 15:53:38

2K+ Views

Networking is the procedure to connect various devices and systems, allowing communication and exchange of information. It has become now a necessary aspect of our day-today lives, with the internet and other networked technologies opening us to work and learn to socialize on a global scale. Yet despite its presence everywhere, there are many unknown facts about networking that even tech-savvy individuals might not be aware of. In this article, we will traverse some of these lesser-known facts and shed light on the interesting word of networking. Unknown facts of Networking The first computer network was made in the 1960s ... Read More

Types of VoIP Hacking and Counter Measures

Pranavnath
Updated on 12-Apr-2023 15:52:06

565 Views

Voice over internet protocol is related to the collection of different technology that allows the easy and effective delivery of voice communication, video, audio, and images with the help of the data network through internet protocol. It can also be referred to as a technology that makes it very easier to make voice calls by making use of Internet connections. VoIP makes it very easier and more flexible to make calls as compared to the traditional telephone system. To reduce voice over Internet protocol hacking it is important to incorporate various measures that could include designing a strong password ... Read More

Types of Spanning Tree Protocol (STP)

Pranavnath
Updated on 12-Apr-2023 15:51:08

1K+ Views

STP is one type of network in the computer science field. It is 2 network layer protocol that is used to obstruct problems that appear while computers contest to use shared telecommunications paths through a local area network. A similar segment is ascenders for another segment and affords accordingly, network segmentation helps in decreasing the competition for other networks and also decreases the chances of a network coming to the network platform. It’s very easy to use and it’s also effective in providing support for bridges and switches. It helps in providing a link and reducing redundancy and preventing ... Read More

Types of Memory on a Cisco Device

Pranavnath
Updated on 12-Apr-2023 15:49:51

2K+ Views

Cisco provides products and services to help in building computer networks, including switches, routers, and software at individual and business scales. All the networking hardware, operating systems, and routers use different types of memory and it is determined by what functions the memory serves in the system. For example, a router ensures a secure path for the successful delivery of data transmission. Router uses a routing table where static and dynamic addresses are allocated which helps in successful transmission. These addresses are stored in memory. For easy and effective handling of data and information, memory is categorized into different types. ... Read More

Type C Port in Computer Network

Pranavnath
Updated on 12-Apr-2023 15:48:54

258 Views

The Type-C Port is a new connection device for the power supply and also for the movement of data between electronic devices. It is also known as a USB-C port. It is an upgraded version of the preceding USB connectors. It is commonly used in mobile phones, the newest laptops, and tablets for charging purposes recently. With the invention of this USB standard fast charging was made possible among smartphones. USB-C connectors are also used for transferring data among different devices. By using USB-C connectors data can be carried faster than the older standards of USB connectors. It also replaced ... Read More

Transparency of RPC in Distributed Networks

Pranavnath
Updated on 12-Apr-2023 15:47:06

1K+ Views

In this article, we will study the Transparency of RPC in distributed Networks. Communication between different nodes is essential in a distributed network to achieve the desired functionality. RPC also called a Remote Procedure Call allows communication between different nodes or systems. RPC can be termed as a protocol that one program uses to execute the programs on remote servers as if that program was located locally. But RPC transparency is sometimes critical to the success of distributed networks. RPC can also be defined as a function call used by one program to request a service from another program. These ... Read More

Advertisements