Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 16 of 122
Need of IOT SSL Certificates and its Concerns
An SSL (Secure Sockets Layer) certificate is a digital certificate that authenticates and verifies the identity of a website or server and enables secure communication between a client (such as a web browser) and the server. SSL certificates utilize encryption to ensure sensitive data is exchanged between the client and server, guaranteeing that it remains private and secure. Components of SSL Certificate Component Description Subject Entity (website or server) for which the certificate is issued Issuer Certificate Authority (CA) that signs and issues the certificate Public Key ...
Read MoreTop 8 Most Powerful Countries in Cyberspace
In the digital age, the concept of power has transcended geographical boundaries, expanding into the virtual domain of cyberspace. The ability to exert influence and project strength within the cyber realm has become a crucial component of a country's overall global standing. As technology continues to advance, nations are increasingly investing resources in their cyber capabilities, giving rise to a new form of power − cyber power. Key Indicators of Cyber Power Cyber power is measured through several key indicators including offensive capabilities (ability to conduct cyber attacks), defensive infrastructure (protection against threats), technological innovation (development of cutting-edge ...
Read MoreFiber Distributed Data Interface (FDDI)
Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for high-speed data transmission in local area networks (LANs) using fiber optic cables. It was designed for large LANs that can extend up to 200 kilometers in diameter, providing reliable backbone connectivity for enterprise networks. Key Features Dual Ring Architecture − Uses two counter-rotating token rings for redundancy and fault tolerance. High Data Rate − Provides 100 Mbps transmission speed, supporting thousands of users simultaneously. Fiber Optic Medium − Uses optical fiber as the physical transmission medium for immunity ...
Read MoreDifference between Circuit Switching and Packet Switching
Circuit Switching and Packet Switching are two fundamental approaches to data transmission in computer networks. Circuit switching establishes a dedicated communication path, while packet switching divides data into packets that travel independently through the network. Circuit Switching Circuit switching is a connection-oriented service that provides a dedicated path from the sender to the receiver. A connection setup is required before data transmission can begin. This method has very little chance of data loss due to the dedicated circuit, but bandwidth can be wasted since the same path cannot be used by other senders during transmission. Circuit switching is ...
Read MoreNMAP Cheat Sheet
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers features for probing computer networks, including host discovery and service and operating system detection. Nmap provides additional information on targets, including reverse DNS names, device types, and MAC addresses. It supports scriptable interaction through the Nmap Scripting Engine (NSE) for advanced network reconnaissance. Nmap Network Discovery Process Scanner Host Discovery ...
Read MoreWhat is Congestion Control Algorithm?
Congestion control is a critical mechanism in computer networks that prevents network performance degradation when too many packets traverse the communication medium. When the number of packets exceeds the network's capacity, delays increase significantly beyond normal propagation delays, creating a congested state. There are two primary congestion control algorithms used in network traffic management: Leaky Bucket Algorithm The leaky bucket algorithm is a traffic shaping technique that controls the rate at which data is injected into a network. It smooths bursty traffic into a steady stream by enforcing a constant output rate regardless of input variations. ...
Read MoreA Protocol Using Go-Back-N
Go-Back-N protocol, also called Go-Back-N Automatic Repeat reQuest, is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1. Working Principle Go-Back-N ARQ provides for sending multiple frames before receiving the acknowledgment for the first frame. The frames are sequentially numbered and a finite number of frames. The maximum number of frames that can be sent depends upon the size of the sending window. If the acknowledgment of ...
Read MoreWhat is IEEE 802.3?
IEEE 802.3 is a set of standards and protocols that define Ethernet-based networks. Ethernet technologies are primarily used in LANs, though they can also be used in MANs and even WANs. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. The IEEE 802.3 standard specifies how data is transmitted over various physical media, including coaxial cables, twisted pair cables, and fiber optic cables. It also defines the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) access method used in traditional Ethernet networks. IEEE 802.3 Popular ...
Read MoreBest Roadmap for Ethical Hacking (Infographics)
A Certified Ethical Hacker (CEH), commonly called a "White Hat Hacker, " is a trained security professional who identifies and repairs computer and network security vulnerabilities by employing the same techniques and tools used by malicious hackers, but with authorization and for defensive purposes. Since the beginning of the internet, hackers have utilized sophisticated tools to exploit weaknesses in system defenses. However, security experts following the ethical hacking roadmap are the defenders working to patch IT systems before they can be exploited by malicious actors. The Certified Ethical Hacker (CEH) credential from the EC-Council is highly regarded and ...
Read MoreWhat are the Top exploited vulnerabilities of 2023?
Within the ever-evolving landscape of cybersecurity, staying informed about the latest vulnerabilities and exploits is crucial. As technology advances, so do the methods used by cybercriminals to breach systems and compromise sensitive data. The year 2023 has seen its fair share of vulnerabilities that have been exploited by malicious actors. In this article, we will explore some of the top exploited vulnerabilities of 2023, shedding light on the potential risks they pose and the measures that can be taken to mitigate them. Major Exploited Vulnerabilities of 2023 ChatGPT Redis Library Vulnerability This vulnerability was disclosed in March ...
Read More