Computer Network Articles

Page 67 of 122

What are flooding, static routing and dynamic routing?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

Network routing is the process of determining the optimal path for data packets to travel from source to destination. There are three fundamental approaches to routing: flooding, static routing, and dynamic routing. Each method has distinct characteristics, advantages, and use cases in network communication. Flooding Flooding is the simplest routing technique that requires no network topology information, load conditions, or path cost calculations. When a node receives a packet, it forwards copies to all outgoing links except the one from which it arrived. This approach ensures that if any path exists between source and destination, the packet ...

Read More

What is Silly Window Syndrome in TCP?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 5K+ Views

TCP is a transmission control protocol that provides reliable, connection-oriented communication between sender and receiver. It includes flow control mechanisms to prevent fast senders from overwhelming slow receivers, using a sliding window protocol to manage data transmission efficiently. Silly Window Syndrome is a performance problem in TCP that occurs when the effective window size becomes very small, leading to inefficient data transmission. This happens when tiny segments (sometimes just one byte) are transmitted repeatedly, causing significant overhead since the TCP header is typically 20 bytes or more. Silly Window Syndrome Problem ...

Read More

What are issues and solutions related to TCP in networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

The Transmission Control Protocol (TCP) faces several challenges in network environments that can significantly impact performance and efficiency. Understanding these issues and their solutions is crucial for maintaining optimal network communication. The main TCP issues include Silly Window Syndrome and Congestion Window Management problems, each requiring specific algorithmic solutions to ensure reliable and efficient data transmission. Silly Window Syndrome Silly Window Syndrome is a TCP flow control problem where the sender's window size shrinks to extremely small values, causing data packets to be smaller than the TCP header itself. This makes the TCP protocol highly inefficient as ...

Read More

What are the ways of security implementation in storage networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 764 Views

Storage network security implementation involves multiple strategies to protect data in transit and at rest across network-attached storage systems. A comprehensive approach requires careful assessment, planning, and deployment of various security measures. Prerequisites for Storage Network Security Before implementing storage network security, organizations must establish several foundational elements: Risk Assessment − Complete an overall IT and security risk assessment study including threat probabilities and business impact analysis. Security Context − Establish a foundation to develop a credible storage network security plan based on assessment results. Budget Planning − Define overall IT ...

Read More

What are risks in implementing the RSA algorithm without padding?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

The RSA algorithm stands for Rivest-Shamir-Adleman algorithm. RSA is the most commonly used public key cryptographic algorithm and can be used for both encryption and digital signing. RSA uses variable-size encryption blocks and keys. The key pair derives from a very large number n that is the product of two large prime numbers selected through special mathematical rules. The public key includes n, and since deriving one of the prime factors from n alone is computationally infeasible for an adversary, this mathematical difficulty makes RSA secure when sufficiently long keys are used. Padding is additional data added to ...

Read More

What is the Default Gateway?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 4K+ Views

A default gateway is a network node (typically a router) that serves as an access point or IP router that a networked computer uses to send information to a computer in another network or the internet. When a device needs to communicate with a host outside its local network, it forwards the packet to the default gateway. The default gateway acts as an intermediary between the local network and external networks. It examines the destination IP address of outgoing packets and determines whether they should be delivered locally or forwarded to another network. Default ...

Read More

What are the network security types?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 613 Views

Network security is the protection of access to files and directories in a computer network against hacking, misuse, and unauthorized changes to the system. It encompasses various technologies, policies, and practices designed to defend network infrastructure and data from cyber threats. Importance of Network Security Network security is built around three fundamental principles known as the CIA Triad: Confidentiality − Protects sensitive information from unauthorized access and disclosure. Organizations must guard against malicious actions that could compromise confidential data such as customer records, financial information, or trade secrets. Integrity − Ensures that information ...

Read More

What is Basic Communication Model?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 18K+ Views

The basic communication model in computer networking represents the fundamental framework for data exchange between devices. It consists of a sender who encodes a message, transmits it through a communication channel or medium, and a receiver who decodes the message and provides feedback. Basic Communication Model Sender (Encode) Communication Channel Receiver (Decode) ...

Read More

What is router architecture?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 16K+ Views

A router is a network device that forwards data packets between computer networks. Router architecture is designed to perform two essential functions: processing routable protocols and using routing protocols to determine the optimal path for data transmission. Architecture of Router A router consists of four fundamental components that work together to enable efficient packet forwarding and routing decisions. Router Architecture Input Ports Switching Fabric (Hardware) ...

Read More

What is a firewall? What are the advantages of hardware and software firewalls?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted internal networks and untrusted external networks, filtering data packets to prevent unauthorized access and cyber threats. Firewalls examine each data packet against configured rules to determine whether to allow, block, or drop the traffic. They can be implemented as hardware appliances, software applications, or cloud-based services. Firewall Network Protection Internal Network (Trusted) ...

Read More
Showing 661–670 of 1,219 articles
« Prev 1 65 66 67 68 69 122 Next »
Advertisements