Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Engineering Articles
Page 26 of 36
QOS Traffic Scheduling
QoS traffic scheduling is a network management methodology that organizes and prioritizes data transmission based on Quality of Service (QoS) requirements. In this approach, frames or packets are mapped to internal forwarding queues according to their QoS information and then serviced using specific queuing schemes. Network devices typically maintain multiple queues, each with different priority levels. The scheduler determines the treatment given to traffic in each queue, mapping incoming traffic to appropriate queues based on its characteristics. For example, time-sensitive traffic like voice and video is placed in higher-priority queues than background data transfers. ...
Read MoreDifference Between Virtual Private Network (VPN) and Proxy
Both VPN and Proxy are network technologies used to access remote systems and route internet traffic, but they serve different purposes and offer varying levels of security. VPNs provide superior privacy and security by creating encrypted tunnels for all network traffic, while proxies simply act as intermediaries for specific applications without inherent security features. Understanding the differences between these technologies helps in choosing the right solution for your networking needs, whether for privacy, security, or simple content access. What is a Virtual Private Network (VPN)? A Virtual Private Network (VPN) creates a secure, encrypted connection between a ...
Read MoreDifference between site to site VPN and remote access VPN
Both Site-to-Site VPN and Remote Access VPN are types of virtual private networks used for securely transferring data and accessing resources from remote locations over public networks. While they share the common goal of establishing secure connections, they serve different purposes and operate in distinct ways. In this article, we will differentiate Site-to-Site VPN and Remote Access VPN based on their features, implementation, and use cases. What is a VPN? A Virtual Private Network (VPN) connects users or networks to a private network across a public network, enabling secure data transmission as if they were directly connected ...
Read MoreWhat is Data Link Layer Switching?
Data Link Layer Switching is the process of forwarding data frames between network segments using MAC addresses. This switching occurs at Layer 2 of the OSI model, where network devices called bridges and switches examine destination MAC addresses to determine the appropriate output port for frame forwarding. The data link layer receives a stream of bits from the physical layer, organizes them into frames, and uses switching to deliver these frames to their intended destinations within the same network segment or across connected segments. Data Link Layer Switching Process ...
Read MoreWhat is Virtual LAN?
A Virtual Local Area Network (VLAN) is a logical grouping of devices that appear to be on the same LAN regardless of their physical network location. Network administrators use VLANs to partition networks based on functional requirements, allowing devices to communicate as if they were connected to separate physical LANs. VLAN Configuration Example Switch PC1 (Sales) PC2 (Sales) ...
Read MoreWhat is Cut-through switching?
In data communications, cut-through switching is a method of switching data frames or packets where the switching device (bridge or switch) forwards the frames as soon as the destination address is available without waiting for the rest of the data to arrive. Working Principle Cut-through switching is used in packet switching systems. In packet-switching, the message is divided into a number of units called packets that are individually routed from the source to the destination. There is no need to establish a dedicated circuit for communication, since it is a connectionless network switching technique. In cut-through switching, ...
Read MoreWhat is Wormhole switching?
In data communications, wormhole switching is a flow control technique where large data frames or packets are partitioned into smaller units and then transmitted. When a switching device (a bridge or a switch) receives a data packet, it partitions the packet into small parts called flow control units or flits. The flits are transmitted one by one instead of the whole packet. Also called wormhole flow control, wormhole switching is a subtype of flit-buffer flow control methods and is based upon fixed links. Wormhole Switching — Packet Division Original Packet ...
Read MoreGet the Reverse Shell with MSI package
Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is msiexec.exe. In penetration testing, MSI packages can be leveraged to obtain reverse shells on target Windows systems. This technique exploits the legitimate Windows Installer functionality to execute malicious payloads. How It Works The MSI reverse shell technique works by creating a malicious MSI package containing a reverse shell payload. When executed on the target system using msiexec, the package triggers the payload to establish a connection back ...
Read MoreFunctions of the Network Layer
The network layer or layer 3 of the OSI model is responsible for delivering data packets from source to destination across multiple hops or links. It also controls the operation of subnets and manages logical addressing for end-to-end communication. The network layer acts as an intermediary between the transport layer above and the data link layer below, ensuring reliable packet delivery across interconnected networks. Network Layer Functions Source Host Transport ...
Read MoreNetwork Layer Design Issues
The network layer or layer 3 of the OSI (Open Systems Interconnection) model is concerned with delivery of data packets from the source to the destination across multiple hops or links. It is the lowest layer that is concerned with end−to−end transmission. The designers who are concerned with designing this layer need to address certain critical issues that encompass the services provided to the upper layers as well as internal design of the layer. The design issues can be elaborated under four heads: Store−and−Forward Packet Switching Services to Transport Layer Providing Connection Oriented Service Providing Connectionless Service ...
Read More