Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 18 of 122
Hashed Message Authentication Code (HMAC)
HMAC (Hashed Message Authentication Code) is a cryptographic mechanism that combines a secret key with a hash function to provide both message authentication and integrity verification. Unlike simple hashing, HMAC ensures that only parties possessing the shared secret key can generate or verify the authentication code. HMAC is widely used in secure communication protocols including TLS/SSL, IPsec, and JWT tokens. It provides a reliable method to detect message tampering and verify the sender's identity in distributed systems and API authentication. How HMAC Works HMAC follows a specific construction that makes it resistant to various cryptographic attacks: ...
Read MoreTypes of Authentication Protocols
Authentication protocols are methods or procedures used to verify the identity of a user, device, or system. These protocols are designed to ensure that only authorized users or devices can access protected resources, preventing unauthorized access or tampering. Authentication Process Flow User Requests Access Auth Server Verifies Identity Resource Grants Access ...
Read MoreThe Reflection Attack
A reflection attack is a type of Distributed Denial of Service (DDoS) attack where an attacker sends requests to legitimate servers using the victim's spoofed IP address. The servers unknowingly respond to these requests, directing their responses to the victim instead of the attacker. This creates a flood of unwanted traffic that can overwhelm the victim's network connection. Reflection attacks are particularly effective because they use legitimate infrastructure to carry out the attack, making them difficult to detect and block. The attacker remains hidden while legitimate servers become unwitting participants in the assault. Reflection ...
Read MoreDifference between Intranet and VPN
An intranet is a private network used within an organization that mimics the functionality of the Internet but remains isolated from external access. A VPN (Virtual Private Network) is a technology that creates secure, encrypted connections over public networks, allowing users to access resources remotely as if they were connected locally. Both technologies serve different purposes in modern business networking. While intranets facilitate internal communication and collaboration within organizations, VPNs enable secure remote access and protect data transmission over untrusted networks. What is an Intranet? An intranet is a private computer network accessible only to authorized users ...
Read MoreComputer Network - Definition, Components, Objectives
A computer network is a collection of interconnected computing devices that can exchange data and share resources with each other. These networked devices use standardized rules called communication protocols to transmit information over physical or wireless connections. Computer networks enable distributed processing where tasks are divided among multiple computers rather than being handled by a single machine. This collaborative approach allows organizations to achieve greater efficiency, resource sharing, and scalability across different locations. Basic Computer Network Structure Client Client ...
Read MoreConnection-Oriented Services
A connection-oriented service is one that establishes a dedicated connection between the communicating entities before data communication commences. It is modeled after the telephone system. To use a connection-oriented service, the user first establishes a connection, uses it, and then releases it. In connection-oriented services, the data streams/packets are delivered to the receiver in the same order in which they have been sent by the sender. Connection-Oriented Service Flow Sender Receiver 1. Connection Request 2. ...
Read MoreConnectionless Services
A Connectionless service is a data communication method between two nodes where the sender transmits data without establishing a dedicated connection or ensuring the receiver's availability. In this model, each data packet contains complete destination addressing information and is routed independently of other packets through the network. Unlike connection-oriented services, connectionless communication requires no initial handshake or connection setup. Data packets, called datagrams, may take different paths to reach their destination, with the network making routing decisions independently for each packet. Connectionless Service - Independent Packet Routing Sender ...
Read MoreReference Models in Computer Network
In computer networks, reference models provide a conceptual framework that standardizes communication between heterogeneous networks. These models define how data should flow through different layers of network architecture, ensuring interoperability between different systems and technologies. The two most widely adopted reference models are: OSI Model − A theoretical seven-layer model TCP/IP Protocol Suite − A practical four-layer model used on the Internet OSI Model The OSI (Open System Interconnection) model was developed by the International Standards Organization (ISO). It provides a layered networking framework that conceptualizes how communication should occur between heterogeneous systems through ...
Read MoreThe Data Link Layer of OSI Model
The Data Link Layer (Layer 2) of the OSI model converts the raw transmission facility provided by the physical layer into a reliable and error-free communication link between adjacent network nodes. This layer acts as a bridge between the physical transmission medium and the network layer, ensuring that data frames are delivered accurately across a single network segment or local link. Primary Functions Framing − It breaks up the stream of bits into manageable data frames, typically ranging from a few hundred to a few thousand bytes in size. Addressing − It ensures ...
Read MoreThe Host-to-Network Layer in TCP/IP Model
The host-to-network layer is the lowest layer of the TCP/IP model and is concerned with the physical transmission of data. It is also called a network interface layer or link layer. It can be considered as the combination of physical layer and data link layer of the OSI model. Functions of Host-to-Network Layer Bit encoding − It defines how bits are to be encoded into optical or electrical pulses. Frame encapsulation − It accepts IP packets from the network layer and encapsulates them into frames. It synchronizes the transmission of the frames as well ...
Read More