Found 1217 Articles for MCA

Type of VPN and its protocols

Ayushi Bhargava
Updated on 28-Oct-2021 07:14:43

2K+ Views

VPN is an abbreviation for Virtual Private Network. It allows a person to safely and discreetly connect to a private network over the Web. VPN establishes a secure channel known as a VPN tunnel, through which all Internet traffic and conversation is routed.Remote Access VPNA Remote Access VPN allows people to connect to a private network and remotely access all of its resources and services. The person's connection to the private network is made over the Internet, and the connectivity is safe and confidential. Remote Access VPN is beneficial to both residential and business users.While away from the office, a ... Read More

TCP Client-Server Program to Check if a Given String is a Palindrome

Ayushi Bhargava
Updated on 28-Oct-2021 07:10:30

2K+ Views

A Palindrome is a word, phrase, or sequence that reads the same backward as forward, e.g., "madam" or "nurses run".TCP Client-Server ProgramClient and server configuration in which a client connects transmits a string to the server, and the server displays the original string and sends a confirmation to the client through socket connection whether the string is a palindrome or not.Input − WOWOutput − PalindromeInput − soapOutput − Not PalindromeHow Does It Work?First, establish a client-server connection.After the connection is established, the client utilizes the send system function to deliver the user input string to the server.The server will wait ... Read More

TCP and UDP in Transport Layer

Ayushi Bhargava
Updated on 28-Oct-2021 06:52:54

2K+ Views

Layer 3 or the Network layer employs IP, or Internet Protocol, which is a connectionless protocol that processes each packet independently, resulting in a lack of transmission dependability. When data is transmitted from one host to another, each packet, even though it belongs to the same session, may travel a distinct path. This implies that the packets could or might not arrive in the correct order. As a result, IP’s dependability is reliant on higher-layer protocols.Transmission Control Protocol (TCP)TCP is a protocol that allows data to be sent from one computer to another. TCP is a layer 4 protocol that ... Read More

What is Secure Socket Layer (SSL)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:51:45

16K+ Views

Secure Sockets LayerSecure Sockets Layer (SSL) is a standard technique for transmitting documents securely across a network. SSL technology, created by Netscape, establishes a secure connection between a Web server and a browser, ensuring private and secure data transmission. SSL communicates using the Transport Control Protocol (TCP).The term "socket" in SSL refers to the method of sending data via a network between a client and a server.A Web server requires an SSL certificate to establish a secure SSL connection while using SSL for safe Internet transactions. SSL encrypts network connection segments atop the transport layer, a network connection component above ... Read More

Synchronous Optical Network (SONET) in Computer Networks

Ayushi Bhargava
Updated on 28-Oct-2021 06:49:04

7K+ Views

SONET is a standardized digital communication protocol that uses a fiber optic medium to transfer huge amounts of data across great distances. Multiple digital data streams are transmitted via optical fiber at the same time utilizing LEDs and laser beams in SONET.Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) are established protocols that use lasers or highly coherent light from light-emitting diodes to transport multiple digital bit streams simultaneously across optical fiber (LEDs). Data can also be transmitted over an electrical link at modest transmission rates. The technique was created to replace the plesiochronous digital hierarchy (PDH) system for ... Read More

Types of Information Systems

Ayushi Bhargava
Updated on 28-Oct-2021 06:33:49

7K+ Views

What is an Information System?A formal, sociotechnical organizational system designed to gather, process, store, and disseminate information is known as an information system (IS). Information systems comprise four components from a sociotechnical standpoint − task, people, structure (or roles), and technology.Information systems consist of members that gather, store, and process data, with the data being utilized to give information, add to knowledge and create digital products that aid decision-making.Organizational levels, data mode, processing, system objectives, and type of assistance given are all used to classify information systems.Types of Information SystemThe following images shows the types of Information Systems −Transaction Processing ... Read More

Transition from IPv4 to IPv6 address

Ayushi Bhargava
Updated on 28-Oct-2021 06:32:48

3K+ Views

Many companies have prioritized migration to IPv6 since there is practically no inventory of IPv4 addresses left. However, switching to IPv6 without a lengthy transition procedure is next to impossible. This is due to the fact that IPv6 has never been backward compatible with IPv4. This implies that when hosts and routers are upgraded to IPv6, the old system continues to function alongside the new one without requiring any additional adjustments.Network Transition from IPv4 to IPv6Here are a few techniques for easing the transition between IPV4 and IPV6 systems to tackle the problem of interoperability.Dual-stackWhen switching from IPv4 to IPv6, ... Read More

What is Sybil Attack in Computer Networks?

Ayushi Bhargava
Updated on 28-Oct-2021 06:31:36

328 Views

A Sybil Attack subverts a network service's reputation system by establishing a large number of pseudonymous identities and using them to wield disproportionately great power. It's called after Sybil, the protagonist of the novel Sybil, which is a case study of a lady diagnosed with a dissociative identity disorder. Sock puppetry is another term for Sybil assaults.In computer security, a Sybil Attack is a method of subverting a reputation system by establishing numerous identities. The vulnerability of a reputation system to a Sybil attack is determined by how cheap identities can be generated and the extent to which the reputation ... Read More

Voice Biometric Technique in Network Security

Ayushi Bhargava
Updated on 28-Oct-2021 06:30:32

269 Views

BiometricsBody measurements and computations linked to human traits are referred to as biometrics. Biometric authentication is a type of identification and access control used in computer science. It's also used to track down individuals in groups that are being watched.Individuals are labeled and described using biometric identifiers, which are unique, quantifiable traits. Physiological features, which are connected to the form of the body, are commonly used to classify biometric identifiers. A few examples are Fingerprints, palm veins, facial recognition, DNA, palm print, hand geometry, iris identification, retina, and odor/scent.Customers may "speak on the dotted line" with Vocal Biometrics, which is ... Read More

Various Failures in Distributed Systems

Ayushi Bhargava
Updated on 28-Oct-2021 06:29:21

5K+ Views

Restoration failure can be a complicated issue, especially for distributed systems, where there may be multiple participating devices and multiple failure points. It is very instructive to find different roles in the program and ask each one, "What would happen if that part of the program failed?" Designing a reliable system that can recover from failure requires identifying the types of failure the system must deal with.In a distributed system, we need to deal with mainly four types of failures −Transaction failure (abortion), Site (program) failure, Media (disk) failure, andCommunication line failure.Some of these are due to hardware, and some ... Read More

Advertisements