Computer Network Articles

Page 18 of 122

Hashed Message Authentication Code (HMAC)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 14K+ Views

HMAC (Hashed Message Authentication Code) is a cryptographic mechanism that combines a secret key with a hash function to provide both message authentication and integrity verification. Unlike simple hashing, HMAC ensures that only parties possessing the shared secret key can generate or verify the authentication code. HMAC is widely used in secure communication protocols including TLS/SSL, IPsec, and JWT tokens. It provides a reliable method to detect message tampering and verify the sender's identity in distributed systems and API authentication. How HMAC Works HMAC follows a specific construction that makes it resistant to various cryptographic attacks: ...

Read More

Types of Authentication Protocols

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 9K+ Views

Authentication protocols are methods or procedures used to verify the identity of a user, device, or system. These protocols are designed to ensure that only authorized users or devices can access protected resources, preventing unauthorized access or tampering. Authentication Process Flow User Requests Access Auth Server Verifies Identity Resource Grants Access ...

Read More

The Reflection Attack

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

A reflection attack is a type of Distributed Denial of Service (DDoS) attack where an attacker sends requests to legitimate servers using the victim's spoofed IP address. The servers unknowingly respond to these requests, directing their responses to the victim instead of the attacker. This creates a flood of unwanted traffic that can overwhelm the victim's network connection. Reflection attacks are particularly effective because they use legitimate infrastructure to carry out the attack, making them difficult to detect and block. The attacker remains hidden while legitimate servers become unwitting participants in the assault. Reflection ...

Read More

Difference between Intranet and VPN

Md. Sajid
Md. Sajid
Updated on 16-Mar-2026 2K+ Views

An intranet is a private network used within an organization that mimics the functionality of the Internet but remains isolated from external access. A VPN (Virtual Private Network) is a technology that creates secure, encrypted connections over public networks, allowing users to access resources remotely as if they were connected locally. Both technologies serve different purposes in modern business networking. While intranets facilitate internal communication and collaboration within organizations, VPNs enable secure remote access and protect data transmission over untrusted networks. What is an Intranet? An intranet is a private computer network accessible only to authorized users ...

Read More

Computer Network - Definition, Components, Objectives

Shubham Vora
Shubham Vora
Updated on 16-Mar-2026 2K+ Views

A computer network is a collection of interconnected computing devices that can exchange data and share resources with each other. These networked devices use standardized rules called communication protocols to transmit information over physical or wireless connections. Computer networks enable distributed processing where tasks are divided among multiple computers rather than being handled by a single machine. This collaborative approach allows organizations to achieve greater efficiency, resource sharing, and scalability across different locations. Basic Computer Network Structure Client Client ...

Read More

Connection-Oriented Services

Jai Janardhan
Jai Janardhan
Updated on 16-Mar-2026 7K+ Views

A connection-oriented service is one that establishes a dedicated connection between the communicating entities before data communication commences. It is modeled after the telephone system. To use a connection-oriented service, the user first establishes a connection, uses it, and then releases it. In connection-oriented services, the data streams/packets are delivered to the receiver in the same order in which they have been sent by the sender. Connection-Oriented Service Flow Sender Receiver 1. Connection Request 2. ...

Read More

Connectionless Services

Arushi
Arushi
Updated on 16-Mar-2026 5K+ Views

A Connectionless service is a data communication method between two nodes where the sender transmits data without establishing a dedicated connection or ensuring the receiver's availability. In this model, each data packet contains complete destination addressing information and is routed independently of other packets through the network. Unlike connection-oriented services, connectionless communication requires no initial handshake or connection setup. Data packets, called datagrams, may take different paths to reach their destination, with the network making routing decisions independently for each packet. Connectionless Service - Independent Packet Routing Sender ...

Read More

Reference Models in Computer Network

Paul Richard
Paul Richard
Updated on 16-Mar-2026 25K+ Views

In computer networks, reference models provide a conceptual framework that standardizes communication between heterogeneous networks. These models define how data should flow through different layers of network architecture, ensuring interoperability between different systems and technologies. The two most widely adopted reference models are: OSI Model − A theoretical seven-layer model TCP/IP Protocol Suite − A practical four-layer model used on the Internet OSI Model The OSI (Open System Interconnection) model was developed by the International Standards Organization (ISO). It provides a layered networking framework that conceptualizes how communication should occur between heterogeneous systems through ...

Read More

The Data Link Layer of OSI Model

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 2K+ Views

The Data Link Layer (Layer 2) of the OSI model converts the raw transmission facility provided by the physical layer into a reliable and error-free communication link between adjacent network nodes. This layer acts as a bridge between the physical transmission medium and the network layer, ensuring that data frames are delivered accurately across a single network segment or local link. Primary Functions Framing − It breaks up the stream of bits into manageable data frames, typically ranging from a few hundred to a few thousand bytes in size. Addressing − It ensures ...

Read More

The Host-to-Network Layer in TCP/IP Model

Arushi
Arushi
Updated on 16-Mar-2026 6K+ Views

The host-to-network layer is the lowest layer of the TCP/IP model and is concerned with the physical transmission of data. It is also called a network interface layer or link layer. It can be considered as the combination of physical layer and data link layer of the OSI model. Functions of Host-to-Network Layer Bit encoding − It defines how bits are to be encoded into optical or electrical pulses. Frame encapsulation − It accepts IP packets from the network layer and encapsulates them into frames. It synchronizes the transmission of the frames as well ...

Read More
Showing 171–180 of 1,220 articles
« Prev 1 16 17 18 19 20 122 Next »
Advertisements