Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 33 of 122
Types of Joints in Optical Fiber
Optical fiber is a technology through which data passes in the form of light at high speed. It is a thin transparent cable type that is flexible and can be bent easily Fiber optics cable can be joined many times in one installation using joints. Joints are used to transfer light from one fiber optic cable to another fiber optic cable and are made up of plastic or glass material. In this article, we will explore the various types of Joints in Optical Fiber. Types of joints in optical fiber Unlike the normal joints, these are the special joints used ...
Read MoreVideo Conferencing Protocols
Video Conferencing is an innovative technology that has been developed to communicate with people anywhere around the world using audio and visual communication. It is possible with a good internet connection on PC, laptops, tablets, or smartphones. This visual communication between people allows sharing of information in terms of audio, video, text message, images, etc. Video conferencing enables users to interact with each other or in groups while seeing the faces for making the meeting or conference lively. Group video conferencing feature is used mostly in companies/organizations to organize meetings, record live sessions, deliver presentations, discuss various projects, etc. Video ...
Read MoreTypes of Network Protocols and Their Uses
The world of communication has become possible, popular, and accessible now, because of the ability to share data resources between two devices that may be physically located at a longer distance, but are connected via the same network or the Internet. Network Protocol provides a certain set of rules that need to be followed during the data transmission between the two devices of a network. It helps to communicate with two devices even when the devices are not similar in terms of structure, network, or design. The Network Protocols are designed according to the need of an organization to perform ...
Read MoreUnderstanding Web Authentication behind the login screen
Web Authentication is verifying the user login details in any of the online accounts like an e-commerce website, social media, online banking services, etc. Each time when a user creates an online account in any of the web applications, a unique Id and key value will be created for future verification and these are stored in secured web servers. Authentication can also be done through other ways like matching with retina, fingerprint, and voice recognition. Consider an example of Gmail or any mail account each time during login, the user is required to enter a username or email with a ...
Read MoreTraditional TCP
In this article, we will understand the concept of the Traditional TCP. It is a wired network connection for communication. The Open System Interconnection (OSI) model has seven layers that include the functions of communication over any network. The OSI is considered one of the standard models for much network communication. In the Seven layers, TCP comes under the Fourth layer which is called the Transport layer. TCP/IP model was designed before the development of the OSI model. The TCP always comes along with the IP, the so-called TCP/IP. The main function of TCP/IP is transferring the data using the ...
Read MoreTrusted Systems in Network Security
The term “Trusted system” means that it provides the user with an assurance that no malicious or harmful software affects the computer system. Network Security plays a vital role in many organizations, to keep the data safe and secure from being attacked by cyberattacks or malware. Now Companies are using cloud storage, Wireless network, and remote application, so the challenges in protecting them are also increased. Here the Trusted systems provide Multi-layered security (MLS) for securing the networks. The trusted applications will not allow any changes in the policy. In this article, the models of network security to have trusted ...
Read MoreTransmission mode
Communication is defined as the transfer or sharing of data between any two individuals through a medium and the medium can be wired or wireless. In a computer network, the OSI (Open System Interconnection) model has seven layers for the communication networks. The First layer of OSI is the Physical layer that uses the Transmission mode for transferring the raw data to other devices using a physical medium. Transferring modes refer to the process of transferring data from one point to the other point or device over a particular network. The Channel between the two devices can be buses or ...
Read MoreTypes of Viruses
The Virus is a type of code that enters the system along with any file or programs and carries out malfunctions in the system. The virus-affected program will be a replica of the existing program. They enter the system through any file and when the file runs, parallelly the virus also runs in the background. There are many ways in which the virus gets into the system. Some of them are through mail attachments, by clicking inappropriate advertisements, and by downloading any software, or files from unauthorized websites. The main objective of viruses is to spread them along different hosts. ...
Read MoreTrojan horse and Trap Door
A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ...
Read MoreTop 10 Common Security Log Sources
In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ...
Read More