Found 1310 Articles for Computer Network

2-tier and 3-tier Architecture in Networking

sudhir sharma
Updated on 27-Feb-2023 11:43:42
Architecture in networking refers to the way a network is designed and organized, serving as the blueprint for the interaction and cooperation between different components and systems. Effective network architecture is crucial for a successful network setup and requires careful planning and design. When it comes to classifying network architecture, a common division is single-tier, two-tier, or three-tier. In a two-tier architecture, the network is separated into a client tier where the end-user interacts with the system, and a server tier where applications, data, and processing power reside. This clear separation of responsibilities makes the network easier to manage, secure, ... Read More

The Symmetric Cipher Model

sudhir sharma
Updated on 27-Feb-2023 11:40:54
Encrypting sensitive information is like locking up your valuables in a strongbox, making sure that only those with the key can access it. And one tried and true method for doing so is the Symmetric Cipher Model, also known as Secret Key Cryptography. This encryption model is like having a secret handshake between the sender and receiver, where they both hold the same key to encrypt and decrypt the information being sent. It's fast, simple, and secure all rolled into one, much like killing two birds with one stone. Some of the top reasons to use the Symmetric Cipher Model ... Read More

Schiper Eggli Sandoz Protocol

sudhir sharma
Updated on 27-Feb-2023 16:21:37
The Schiper Eggli Sandoz (SES) protocol, a storied and valiant champion of networking, has a mission to find the best path for data packets to traverse through the network. With a heart of a poet, it distributes the routing information to all routers in the network, rather than entrusting the task to a single central routing table. Such a noble and democratic approach results in more dynamic and efficient routing, as well as rapid recovery from network failures. The SES protocol, armed with the power of the Bellman-Ford algorithm and the cunning of split horizon, determines the shortest path for ... Read More

Poison Reverse vs Split Horizon

sudhir sharma
Updated on 27-Feb-2023 16:17:26
Routing protocols are used to determine the best path for data to travel through a network. They are responsible for maintaining and updating routing tables, which are used by routers to determine the best path for data to travel through a network. There are several different types of routing protocols, each with their own unique characteristics and uses. One of the most commonly used routing protocols is Poison Reverse. Poison Reverse is a technique used to prevent routing loops by marking a route as invalid if it is learned from a neighbor that is not the next hop. This technique ... Read More

How to hide an IP address

sudhir sharma
Updated on 27-Feb-2023 11:32:07
An IP address is like a digital fingerprint, revealing your location and identity online. But just like how you can put on a disguise to hide your physical identity, you can also conceal your IP address to protect your privacy and security. Here are a few methods to do so − I. Using a Virtual Private Network (VPN) Think of a VPN as a cloak of invisibility for your internet browsing. It creates a secure tunnel for all your online activity, and assigns you a new IP address from a different location, making it appear as though you are somewhere ... Read More

Caesar Cipher in Cryptography

Satish Kumar
Updated on 08-Feb-2023 20:31:16
The Caesar Cipher is a simple substitution cipher named after Julius Caesar, who reportedly used it to communicate with his officials. The technique involves shifting each letter in a message by a fixed number of positions in the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The Caesar Cipher is relatively easy to break and is considered to be a very weak form of encryption, but it served its purpose for Julius Caesar. It's still used for educational and recreational purposes. Algorithm for Caesar Cipher Here is ... Read More

Can Two IP Addresses Be Same

Satish Kumar
Updated on 08-Feb-2023 20:39:22
No, two IP addresses cannot be the same in a single network as each IP address serves as a unique identifier for a device connected to a network. In IPv4, an IP address is a 32-bit binary number, typically represented in dotted-decimal notation, that uniquely identifies a device on a TCP/IP network. In IPv6, an IP address is a 128-bit binary number, represented in hexadecimal notation, that also uniquely identifies a device on a TCP/IP network. IP Address Structure An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol ... Read More

CAN Protocol

Satish Kumar
Updated on 08-Feb-2023 20:45:00
The Controller Area Network (CAN) protocol is a communication protocol that was developed for use in the automotive industry, but has also been used in other industries such as industrial automation and medical equipment. It is a serial communication protocol that uses a multi-master, distributed control system. This means that any device on the network, called a node, can initiate communication and all other nodes on the network can participate in the communication. The protocol provides a way for devices to share information and synchronize their actions without the need for a central controller. The protocol uses a collision detection ... Read More

Calling Web Service Using Curl With Telnet Connection

Satish Kumar
Updated on 08-Feb-2023 20:50:08
What is Curl? curl is a command-line tool for transferring data using various protocols. It was designed to work without user interaction, so it is ideal for use in scripts and other automated tasks. curl supports a wide variety of protocols, including HTTP, HTTPS, FTP, SFTP, and many more. With curl, you can send HTTP and HTTPS requests, receive and display HTTP and HTTPS responses, upload and download files, and even send and receive email using the SMTP and IMAP protocols. curl also supports various options and command-line arguments that allow you to control the behavior of the request, such ... Read More

Calculation of TCP Checksum

Satish Kumar
Updated on 08-Feb-2023 20:51:26
The Transmission Control Protocol (TCP) checksum is a method used to detect errors in TCP packets. The checksum is calculated by taking the binary value of all the fields in the TCP header and the data, treating them as a large integer, and then performing a bit-wise ones complement on that integer. To calculate the TCP checksum, the following steps are performed − The checksum field in the TCP header is set to zero. The binary values of the source and destination IP addresses, the reserved field, the protocol field (set to 6 for TCP), the TCP length, and ... Read More
Advertisements