Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Network Articles
Page 3 of 122
Difference between Internet and World Wide Web
Many people get confused when they think about the two terms internet and WWW. They use these terms as a replacement for the other. But both are not same and in this article, we will discuss about the difference between the Internet and WWW. What is the Internet? The internet is being used by billions of users all over the world to search data, play games, watch movies, listen to songs, and do a lot of other things. The internet is a network in which a lot of computers are interconnected to each other. People can communicate with each other ...
Read MoreNear Field Communication
Introduction to Near Field Communication (NFC) Near Field Communication (NFC) may be a short-range remote communication technology that permits two electronic gadgets to set up communication when they are set in the near vicinity, ordinarily inside some centimeters. NFC is an expansion of Radio Recurrence Distinguishing Proof (RFID) innovation and works at a recurrence of 13.56 MHz. NFC innovation empowers contactless communication and information trade between gadgets, making it helpful and proficient for different applications. Working of NFC The essential rule behind NFC is using electromagnetic areas for information exchange. It utilizes inductive coupling, where the NFC-enabled gadgets create attractive ...
Read MoreExplain the functions of a Physical Layer
The physical layer meets all these requirements out. The set of rules and procedures for interaction between physical layers are called Physical layer protocols. The layer provides a physical connection different from the physical transmission path because it is at the bit level while the transmission path is at the electrical signal level. This physical connection can be a point to point physical connection or point to the multi-point physical connection, as shown in the figure − The physical layer provides its services to the data link layer, the next higher layer of the OSI model. The ...
Read MoreIntroduction to Host Names: Understanding the Basics
In the world of computers and the internet, host names are a critical component of how devices connect to each other. A host name is a unique identifier that is assigned to a device or a server on a network. It is used to identify and locate devices on the internet or any other network. What is a Host Name? A host name is a label that is assigned to a device on a network. It is used to identify and locate devices on the internet or any other network. A host name is made up of a combination of ...
Read MoreBest Roadmap for Ethical Hacking (Infographics)
A Certified Ethical Hacker (CEH), commonly called a "White Hat Hacker, " is a trained expert who identifies and repairs computer and network security flaws by employing the same techniques and tools used by hostile hackers. From the beginning of the internet, hackers have utilized their sophisticated tools to take advantage of whatever weak spot they might uncover in a system's defenses. On the other hand, security experts following the ethical hacking roadmap are the good guys trying to patch up IT systems before exploiting them. The Certified Ethical Hacker (CEH) credential from the EC Council is highly regarded and ...
Read MoreNetwork Software
Network software encompasses a broad range of software used for design, implementation, and operation and monitoring of computer networks. Traditional networks were hardware based with software embedded. With the advent of Software – Defined Networking (SDN), software is separated from the hardware thus making it more adaptable to the ever-changing nature of the computer network.Functions of Network SoftwareHelps to set up and install computer networksEnables users to have access to network resources in a seamless mannerAllows administrations to add or remove users from the networkHelps to define locations of data storage and allows users to access that dataHelps administrators and ...
Read MoreTCP 3-Way Handshake Process
Transmission Control Protocol (TCP) provides a secure and reliable connection between two devices using the 3-way handshake process. TCP uses the full-duplex connection to synchronize (SYN) and acknowledge (ACK) each other on both sides. There are three steps for both establishing and closing a connection. They are − SYN, SYN-ACK, and ACK.3-Way Handshake Connection Establishment ProcessThe following diagram shows how a reliable connection is established using 3-way handshake. It will support communication between a web browser on the client and server sides whenever a user navigates the Internet.Synchronization Sequence Number (SYN) − The client sends the SYN to the serverWhen ...
Read MoreWhat is IEEE 802.3?
IEEE 802.3 is a set of standards and protocols that define Ethernet-based networks. Ethernet technologies are primarily used in LANs, though they can also be used in MANs and even WANs. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.IEEE 802.3 Popular VersionsThere are a number of versions of IEEE 802.3 protocol. The most popular ones are.IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial cable into which a connection can be tapped by drilling into the cable to the ...
Read MoreIEEE 802.3 and Ethernet
Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type ...
Read MoreThe Diffie-Hellman Key Exchange
What is Diffie-Hellman Key Exchange (exponential key exchange)? The Diffie-Hellman key exchange (also known as exponential key exchange) is a method for securely exchanging cryptographic keys over an insecure channel. It is a fundamental building block of many secure communication protocols, including SSL/TLS and SSH. The Diffie-Hellman key exchange works by allowing two parties (Alice and Bob) to agree on a shared secret key over an insecure channel, without any other party being able to intercept the key or learn anything about it. The key exchange involves the following steps − Alice and Bob agree on two large prime ...
Read More