
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

23K+ Views
Transmission Control Protocol/Internet Protocol (TCP/IP) are two different communication protocols. TCP splits a message to packets which were transmitted across the internet whereas the IP is accountable to address of every packet hence a chance to forward the exact destination.Previously, there was no TCP/IP and no method for the computers to perform effortlessly over public networks. The main function of TCP/IP is that it governs how the information is sent and received in the form of packets between source and destination.So in short, we can say that TCP defines the communication in a network and how to send data in ... Read More

1K+ Views
Firewall in general is defined as a wall between personal computer and outside world. So it will filter the traffic coming from the outside world based on the user configuration like which sites are trusted sites and which we need to allow.Example of firewall system design is shown below −Components of a Firewall SystemThe components of firewall system are explained below −Perimeter RouterIt is used to provide a link to the public networking system like the internet, or a distinctive organization. It performs the routing of data packets with the help of an appropriate routing protocol. It also provides the ... Read More

1K+ Views
Firewall is a wall between a personal computer and the outside world. So it will filter the traffic coming from the outside world based on the user configuration like which sites are trusted sites and which we need to allow.The diagram given below depicts the firewall:Functions of firewallThe functions of a firewall in computer networking are as follows −Block unsafe URLs.Close down a port completely.Open a port to only specific IP addresses.Allow some ip addresses at specific times.Advantages of Hardware FirewallThe advantages of a hardware firewall are as follows −Hardware firewalls can protect your entire network with a single firewall.Hardware ... Read More

15K+ Views
Router architecture is designed in a way that the routers are equipped to perform two main functions. These functions are as follows:Process routable protocols.Use routing protocols to determine the best path.Let us try to understand the router with the help of architecture:Architecture of RouterGiven below is a diagram which explains the architecture of router:The different factors which help in successful functioning of router are explained below:Input PortThe input port performs many functions. The physical layer functionality of terminating an incoming physical link to a router it can perform.It performs the data link layer functionality needed to interoperate with the data ... Read More

17K+ Views
The basic communication model in computer networking is where the Sender (encodes the message) channel sends a message over a channel or medium and receiver (decodes the message) gives Feedback.ComponentsThe components involved in the successful implementation of the basic communication model are as follows −Sender − Who sends the message.Encodes − Translates messages into symbols like words, pictures, sound, etc.Channel or medium − It used to transmit messages. Some channels are face-to-face communication, over telephone, letters, television, newspapers, radio, etc.Decode − Receiver decodes these symbols to understand what the sender wants to say.Receiver − A person who receives the message.Feedback ... Read More

512 Views
Network security is protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized change to the system.Importance of network securityThe importance of network security is explained below −Confidentiality − Confidentiality is probably the common aspect of information security. We need to protect our confidential information through network security. An organization needs to guard against those malicious actions that endanger the confidentiality of its information.Integrity − Information’s needs to be changed constantly. To keep changes secure we need network security.Availability − The third-party component of information security is called availability. The information created and ... Read More

3K+ Views
A virtual local area network (virtual LAN) is the logical grouping of network nodes.In other words, a virtual LAN is any broadcast domain that is partitioned and isolated in a network. A VLAN allows several networks to work virtually as one LAN.It gives an advantage to connect multiple devices whether it is wired or wireless to a combined single network. It works as a broadcast domain.Benefits of VLANThe benefits that are provided by implementing VLANs are as follows −Reduce the number of routers.All devices can be controlled by the same level.It offers a broadcast domain that reduces the traffic.It gives ... Read More

3K+ Views
A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway is to pass the information to another router when the current packet does not know the destination.It is a node or a router in the network that connects the host to remote network components.Whenever a packet needs to be transmitted to another network, the packet must pass through the default ... Read More

836 Views
The two address translations that are helpful to make internet routing more efficient are NAT (Network address translation) and PAT (Port address translation).Let us discuss the two translation schemes.Network Address Translation (NAT)NAT is used to convert a private IP address into a public IP address and also a public IP address into a private IP address. We use NAT due to the shortage of IP addresses.IP Version 4 is a 32- bit address and it has almost 4.3 billion IP addresses, but the population of the world is much higher and it is approximately about 7.8 billion as of the ... Read More

1K+ Views
Let us begin by understanding what network based attacks are.Network based attacksThe different network-based attacks are as follows −SniffingIn this type of network attack, packets of data are captured and monitored by the hacker. These packets flow between server and client. The attacker intercepts the network to read them.This can actually lead to damage to the data in the organization. This is because it may lead to compromise of private information of the employees, etc.EavesdroppingIn this type of attack, passive activities are performed on the network. The attacker starts to listen to the data flowing between various networks and extract ... Read More