Computer Engineering Articles

Page 26 of 36

QOS Traffic Scheduling

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

QoS traffic scheduling is a network management methodology that organizes and prioritizes data transmission based on Quality of Service (QoS) requirements. In this approach, frames or packets are mapped to internal forwarding queues according to their QoS information and then serviced using specific queuing schemes. Network devices typically maintain multiple queues, each with different priority levels. The scheduler determines the treatment given to traffic in each queue, mapping incoming traffic to appropriate queues based on its characteristics. For example, time-sensitive traffic like voice and video is placed in higher-priority queues than background data transfers. ...

Read More

Difference Between Virtual Private Network (VPN) and Proxy

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 1K+ Views

Both VPN and Proxy are network technologies used to access remote systems and route internet traffic, but they serve different purposes and offer varying levels of security. VPNs provide superior privacy and security by creating encrypted tunnels for all network traffic, while proxies simply act as intermediaries for specific applications without inherent security features. Understanding the differences between these technologies helps in choosing the right solution for your networking needs, whether for privacy, security, or simple content access. What is a Virtual Private Network (VPN)? A Virtual Private Network (VPN) creates a secure, encrypted connection between a ...

Read More

Difference between site to site VPN and remote access VPN

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 2K+ Views

Both Site-to-Site VPN and Remote Access VPN are types of virtual private networks used for securely transferring data and accessing resources from remote locations over public networks. While they share the common goal of establishing secure connections, they serve different purposes and operate in distinct ways. In this article, we will differentiate Site-to-Site VPN and Remote Access VPN based on their features, implementation, and use cases. What is a VPN? A Virtual Private Network (VPN) connects users or networks to a private network across a public network, enabling secure data transmission as if they were directly connected ...

Read More

What is Data Link Layer Switching?

Moumita
Moumita
Updated on 16-Mar-2026 18K+ Views

Data Link Layer Switching is the process of forwarding data frames between network segments using MAC addresses. This switching occurs at Layer 2 of the OSI model, where network devices called bridges and switches examine destination MAC addresses to determine the appropriate output port for frame forwarding. The data link layer receives a stream of bits from the physical layer, organizes them into frames, and uses switching to deliver these frames to their intended destinations within the same network segment or across connected segments. Data Link Layer Switching Process ...

Read More

What is Virtual LAN?

Moumita
Moumita
Updated on 16-Mar-2026 17K+ Views

A Virtual Local Area Network (VLAN) is a logical grouping of devices that appear to be on the same LAN regardless of their physical network location. Network administrators use VLANs to partition networks based on functional requirements, allowing devices to communicate as if they were connected to separate physical LANs. VLAN Configuration Example Switch PC1 (Sales) PC2 (Sales) ...

Read More

What is Cut-through switching?

Moumita
Moumita
Updated on 16-Mar-2026 961 Views

In data communications, cut-through switching is a method of switching data frames or packets where the switching device (bridge or switch) forwards the frames as soon as the destination address is available without waiting for the rest of the data to arrive. Working Principle Cut-through switching is used in packet switching systems. In packet-switching, the message is divided into a number of units called packets that are individually routed from the source to the destination. There is no need to establish a dedicated circuit for communication, since it is a connectionless network switching technique. In cut-through switching, ...

Read More

What is Wormhole switching?

Moumita
Moumita
Updated on 16-Mar-2026 1K+ Views

In data communications, wormhole switching is a flow control technique where large data frames or packets are partitioned into smaller units and then transmitted. When a switching device (a bridge or a switch) receives a data packet, it partitions the packet into small parts called flow control units or flits. The flits are transmitted one by one instead of the whole packet. Also called wormhole flow control, wormhole switching is a subtype of flit-buffer flow control methods and is based upon fixed links. Wormhole Switching — Packet Division Original Packet ...

Read More

Get the Reverse Shell with MSI package

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 2K+ Views

Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is msiexec.exe. In penetration testing, MSI packages can be leveraged to obtain reverse shells on target Windows systems. This technique exploits the legitimate Windows Installer functionality to execute malicious payloads. How It Works The MSI reverse shell technique works by creating a malicious MSI package containing a reverse shell payload. When executed on the target system using msiexec, the package triggers the payload to establish a connection back ...

Read More

Functions of the Network Layer

Moumita
Moumita
Updated on 16-Mar-2026 22K+ Views

The network layer or layer 3 of the OSI model is responsible for delivering data packets from source to destination across multiple hops or links. It also controls the operation of subnets and manages logical addressing for end-to-end communication. The network layer acts as an intermediary between the transport layer above and the data link layer below, ensuring reliable packet delivery across interconnected networks. Network Layer Functions Source Host Transport ...

Read More

Network Layer Design Issues

Moumita
Moumita
Updated on 16-Mar-2026 54K+ Views

The network layer or layer 3 of the OSI (Open Systems Interconnection) model is concerned with delivery of data packets from the source to the destination across multiple hops or links. It is the lowest layer that is concerned with end−to−end transmission. The designers who are concerned with designing this layer need to address certain critical issues that encompass the services provided to the upper layers as well as internal design of the layer. The design issues can be elaborated under four heads: Store−and−Forward Packet Switching Services to Transport Layer Providing Connection Oriented Service Providing Connectionless Service ...

Read More
Showing 251–260 of 353 articles
« Prev 1 24 25 26 27 28 36 Next »
Advertisements