Computer Network Articles

Page 6 of 122

Multi-Protocol Label Switching (MPLS)

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Multiprotocol Label Switching (MPLS) is a routing technique that augments speed and control of network traffic by directing data from one node to the next based on short path labels. Instead of being routed using long network addresses, data packets are routed through path labels that identify virtual paths between nodes rather than endpoints. MPLS speeds up traffic flows by avoiding complex lookups in the routing table at each node as in conventional routing algorithms. MPLS is a scalable and protocol-independent routing technique. It works with Internet Protocol (IP), Ethernet, Frame Relay and Asynchronous Transport Mode (ATM). Despite the ...

Read More

Difference Between Interrupt and Polling in OS

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 16K+ Views

An operating system acts as a bridge between hardware and applications. The CPU handles all system tasks, but sometimes situations arise when it's required to interrupt the currently running task and take rapid action. Therefore, operating systems use two methods: interrupt and polling for dealing with such events. Both methods pause the CPU from its current work and make it execute essential tasks. Both interrupt and polling differ significantly from each other in several ways. In this article, we will discuss the important differences between interrupt and polling in operating systems. What is Interrupt? A signal to ...

Read More

Ethical Hacking Roadmap - 5 Phases to Success

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 965 Views

Security breaches have become a critical challenge for modern organizations. Price Waterhouse Coopers' "The Global State of Information Security Survey 2018" reveals that over 32% of 9, 500 interviewed executives believe their product quality is vulnerable to damage, while 39% are concerned about the loss or compromise of critical data. With cybersecurity affecting company reputation and business continuity, leaders like Tesla's Elon Musk prioritize security as more than just an IT issue. This has led to increased demand for ethical hackers who can proactively identify and fix vulnerabilities before malicious attackers exploit them. What is Ethical Hacking? ...

Read More

Opportunities for Certified Ethical Hackers (CEH)

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 297 Views

A recent study conducted by KPMG found that even though 94% of businesses consider cybercrime to be their primary security concern, 72% of those same businesses have been the target of a cyberattack in the previous year, and 78% still don't have a cyber-incident response plan in place. According to Steve Langan, Chief Executive Officer of Hiscox Insurance, cybercrime "cost the global economy over $450 billion in 2016, more than two billion personal records were stolen, and in the United States alone, more than 100 million Americans had their medical records stolen." Even Consumers WannaCry When hackers target ...

Read More

Everything about Ransomware – Definition, Types, and Prevention

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 312 Views

Ransomware is a type of malicious software that encrypts a victim's files and demands payment (usually in cryptocurrency) for the decryption key. When ransomware attacks a computer, it blocks access to critical data and systems until the ransom is paid. Attackers often threaten to permanently delete files or leak sensitive information publicly if their demands are not met. This form of cyberattack has evolved into one of the most significant security threats facing organizations and individuals worldwide, with attacks becoming increasingly sophisticated and costly. How Ransomware Works Ransomware attacks follow a predictable pattern that unfolds in several ...

Read More

Explain the ATM Cell Structure in Computer Network

Ginni
Ginni
Updated on 16-Mar-2026 8K+ Views

ATM (Asynchronous Transfer Mode) transfers data in fixed-size units called cells. Each cell consists of exactly 53 bytes: 5 bytes for the header containing routing and control information, and 48 bytes for the payload carrying user data. The fixed-size cell structure makes ATM particularly suitable for real-time applications like voice and video transmission, as it minimizes delays caused by waiting for large variable-length packets to be processed. ATM Cell Structure (53 Bytes) Header 5 Bytes Payload (User Data) 48 Bytes ...

Read More

What is the Structure of Management Information (SMI)?

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

Structure of Management Information (SMI) defines the rules and standards for describing managed objects within the Simple Network Management Protocol (SNMP) framework. SMI provides the syntactic structure that allows network management systems to organize, access, and manipulate network device information consistently. In SNMP, managed objects reside in a virtual database called the Management Information Base (MIB). Collections of related objects are organized into MIB modules, which are written using a subset of Abstract Syntax Notation One (ASN.1). This notation describes data structures in a machine-independent language, enabling consistent communication across different network devices and platforms. SMI Data Types ...

Read More

Steps to become a successful paid Ethical Hacker

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 317 Views

In the history of the internet, network security has always been a problem. The field of ethical hacking has gained significant traction over the last few decades. While malevolent hackers want to gain access to systems for their gain, ethical hackers seek to keep those systems secure from harm. Ethical hacking involves breaking into a system on purpose to check its defenses and safeguard it from cyberattacks. Most often, businesses hire ethical hackers to perform penetration testing. These hackers are highly skilled in computer security and play a crucial role in protecting the integrity of an organization's IT infrastructure. ...

Read More

What are the types of Firewalls in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic such as viruses and hackers. There are various types of firewalls in a computer network, each designed to provide different levels of security and functionality: Packet Filtering Firewalls Packet filtering firewalls are the most basic type of firewall that operates at the network layer (Layer ...

Read More

Difference between Ethical Hacker and Forensic Investigator

Uday Mitra
Uday Mitra
Updated on 16-Mar-2026 810 Views

In today's digital landscape, organizations face increasing cybersecurity threats that require specialized expertise to combat. Two key roles have emerged to protect sensitive data and investigate security incidents: ethical hackers and forensic investigators. While both professionals work toward securing digital assets, they serve distinctly different purposes in the cybersecurity ecosystem. Understanding the differences between these roles is crucial for organizations looking to build comprehensive security strategies and for professionals considering careers in cybersecurity. Who is an Ethical Hacker? An ethical hacker, also known as a "white hat" hacker or penetration tester, is a cybersecurity professional who uses ...

Read More
Showing 51–60 of 1,220 articles
« Prev 1 4 5 6 7 8 122 Next »
Advertisements