Computer Network Articles

Page 68 of 122

What are the different components and architectures of firewalls?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

A firewall is a network security system that acts as a protective barrier between a trusted internal network and untrusted external networks like the internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules, filtering data packets to allow or block them according to the organization's security policy. Firewall System Architecture Internet Perimeter Router Firewall ...

Read More

What are the functions of each layer in TCP/IP?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 23K+ Views

Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of communication protocols that enables reliable data transmission across networks. TCP handles message segmentation and reassembly, while IP manages packet addressing and routing to ensure data reaches the correct destination. TCP/IP revolutionized network communication by providing a standardized method for computers to communicate over public networks like the Internet. It defines how information is packaged, addressed, transmitted, and received between network devices. TCP/IP Four-Layer Model Application Layer HTTP, HTTPS, FTP, SMTP, SSH ...

Read More

What is SD-WAN and its working condition?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 664 Views

Software-Defined Wide Area Network (SD-WAN) is a modern networking approach that uses software to control and manage WAN connections between enterprise locations. Unlike traditional WANs that rely on hardware-based routing, SD-WAN virtualizes network functions and enables centralized management through software controllers. SD-WAN transforms how organizations connect branch offices, data centers, and cloud services by decoupling network hardware from its control mechanism. This separation allows network administrators to manage policies, routing decisions, and security from a centralized location, providing greater flexibility and control over network operations. SD-WAN Architecture ...

Read More

How does the IPsec use digital certificates and digital signatures?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

IPSec is one of the most secure techniques for connecting network sites. It provides comprehensive security features for packet transmission across networks, including authentication, integrity, and confidentiality. Digital certificates and digital signatures are fundamental components that enable IPSec to establish trust and verify identities in secure communications. IPSec was designed to provide the following security features when transferring packets across networks: Authentication − Verifies that the packet received is truly from the claimed sender. Integrity − Ensures that the contents of the packet didn't change in transit. Confidentiality − Conceals the message ...

Read More

What are the most used network troubleshooting tools?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 629 Views

Network troubleshooting tools are essential utilities that help network administrators diagnose, identify, and resolve network connectivity issues. These tools provide valuable insights into network performance, routing paths, and configuration problems. Understanding these tools enables administrators to quickly isolate problems and maintain optimal network performance. Here are the most commonly used network troubleshooting tools: Ping The ping command provides a basic connectivity test between the requesting host and destination host. It sends ICMP echo request packets and measures response time, helping identify if a host is reachable and responsive. ping google.com ping 192.168.1.1 Traceroute ...

Read More

What are Logical Link Control (LLC) and Medium Access Control(MAC)?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 23K+ Views

Logical Link Control (LLC) and Medium Access Control (MAC) are two sublayers of the Data Link Layer (Layer 2) in the OSI reference model. These sublayers work together to ensure reliable data transmission between network nodes while managing access to the shared communication medium. The Data Link Layer is responsible for node-to-node delivery, error detection, and flow control. To handle these complex responsibilities efficiently, it is divided into two distinct sublayers, each with specialized functions. Data Link Layer Sublayers Network Layer (Layer 3) ...

Read More

What is the process of securing the network architecture using TSL, SSL, and Cryptography?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 516 Views

Transport Layer Security (TLS) is the modern successor to Secure Sockets Layer (SSL), providing cryptographic protection for network communications. Both protocols secure data transmission between clients and servers over insecure networks through encryption, authentication, and integrity verification. TLS/SSL operates between the transport layer and application layer, protecting protocols like HTTP (creating HTTPS), SMTP, and FTP. These security protocols have become essential for securing web traffic, email communications, and other network services. TLS/SSL Security Architecture Client Server ...

Read More

What is client/server network and types of servers?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 18K+ Views

Local Area Networks are of two types − Peer to Peer network and client/server network. A client/server network is a network architecture where certain computers act as servers that provide resources and services, while other computers act as clients that request and use these services. This centralized approach forms the foundation of most modern business networks. How Client/Server Networks Work In this architecture, a server is a dedicated computer that provides network resources and services to other computers when requested. A client is a computer running programs that request services from servers. All network resources such as ...

Read More

What are wireless sensor networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 11K+ Views

A Wireless Sensor Network (WSN) is a distributed network of small, autonomous devices called sensor nodes that can sense, process, and communicate data wirelessly. These networks combine distributed communication, computing, and sensing capabilities to monitor physical or environmental conditions such as temperature, humidity, pressure, or motion. WSNs are characterized as infrastructure-less, fault-tolerant, and self-organizing networks that provide opportunities for low-cost, easy-to-apply, rapid, and flexible installations in various environments for diverse applications. Wireless Sensor Network Architecture Base Station Data Sink ...

Read More

What is simplex mode of transmission in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 3K+ Views

Simplex mode is a data transmission method where communication flows in only one direction between devices. In this unidirectional communication, one device acts as a sender while the other acts as a receiver, but they cannot switch roles. Transmission modes define how data flows between communicating devices and operate at the physical layer of the network model. The transmission medium and communication channel determine the directional capabilities of the data flow. Types of Transmission Modes There are three primary transmission modes used in computer networks: Simplex Mode − Unidirectional communication Half-duplex Mode − Bidirectional but ...

Read More
Showing 671–680 of 1,219 articles
« Prev 1 66 67 68 69 70 122 Next »
Advertisements