Found 1217 Articles for MCA

What are the basic building blocks of IPSec VPN tunnelling?

Bhanu Priya
Updated on 16-Sep-2021 07:09:53

519 Views

The basic building blocks of the IPsec vpn tunnelling are as follows −Authentication header − it is used to verify the identity of the sender of the data and to check whether it is altered or not. It ties data in every data packet to a verifiable signature. It is used for the purpose of authentication.Encapsulating security payload − the data in the data packet is scrambled by using the encryption technique to prevent the sniffing attacks. It ensures the confidentiality of the data as the data is encrypted and not being able to be understood by anyone except the ... Read More

What are network troubleshooting tools?

Bhanu Priya
Updated on 16-Sep-2021 07:08:55

4K+ Views

The network troubleshooting tools are classified into two types −Hardware toolsThe hardware tools included in the network troubleshooting are explained below −Cable testerIt is also known as a media tester. It is used to test whether the cable works properly or not. The cable testers will confirm whether a cable works correctly and if there is a problem with the cable. Tools which are used for testing of the cable can be classified as a cable tester.Protocol analyserThis tool is used to analyse the network protocols like UDP, TCP, and FTP etc. This acts as a software as well as ... Read More

What are security features of the 4G cellular network?

Bhanu Priya
Updated on 16-Sep-2021 07:06:37

663 Views

4G cellular network is actually the fourth generation of cellular communications.Features of 4GIt comes up with many features which are given below −10x high speed as compared to 3GThe cost is also less for each bit used.It is highly secured too.It comes up with LTE i.e. Long term evaluation which refers to high-speed data connection for mobile devices.Now let us talk about the security features of 4G.Security features of the 4G cellular networkSecurity features are the different types of security measures a 4G network possesses such as the following −Configuration of security − It is the most beautiful feature of ... Read More

What are VLAN, NAT and private IP’s in computer networks?

Bhanu Priya
Updated on 16-Sep-2021 07:05:29

2K+ Views

Let us begin by learning about Virtual LAN (VLAN).Virtual LAN (VLAN)VLANs are logical grouping of devices which are in the same broadcast domain. Computers, servers, network devices are connected logically and their physical location don't matter. We use VLANs to manage traffic, to make the security improved.A VLAN is used when multiple LAN devices are connected to each other, where each can sneak into the data transmitted by two devices, can be seen by a third device and security can be breached.A VLAN will make sure that the data is kept only between two devices. It can be used to ... Read More

What is big data?

Bhanu Priya
Updated on 16-Sep-2021 07:04:26

5K+ Views

In simple language, big data is a collection of data that is larger, more complex than traditional data, and yet growing exponentially with time. It is so huge that no traditional data management software or tool can manage, store, or can process it efficiently. So, it needs to be processed step by step via different methodologies.The Applications of Big Data areBanking and SecuritiesCommunications, Media and EntertainmentHealthcare ProvidersEducationManufacturing and Natural ResourcesGovernmentInsuranceRetail and Wholesale tradeTransportationEnergy and UtilitiesThe Uses of Big Data areLocation TrackingPrecision MedicineFraud Detection & HandlingAdvertisingEntertainment & MediaReal World Big Data ExamplesDiscovering consumer shopping habits.Personalized marketing.Fuel optimization tools for the transportation ... Read More

What are the functions of network address translation?

Bhanu Priya
Updated on 16-Sep-2021 07:03:25

1K+ Views

Network Address Translation (NAT) is a mechanism, through which one or more local IP addresses are translated into one or more global IP addresses. To access the local host also, the global IP addresses are converted to the local IP address.Network Address Translation (NAT) TypesThere are three ways to construct NAT. These are as follows −Static NATDynamic NATPort Address Translation (PAT)Functions of NATThe functions of NAT are explained below −Address translation for data transferThe border router is configured for NAT. The border router has two partsLocal interfaceGlobal interface.When the packets are transmitted from local host to another host in another ... Read More

What are the general techniques to improve the quality of service?

Bhanu Priya
Updated on 16-Sep-2021 07:01:31

12K+ Views

Quality of service (QoS) in the case of networking implies the ability of a network to provide reliable service to the traffic over various technologies including Ethernet, wireless, IP, Asynchronous Mode etc.QOS in case of network congestion must keep in record various elements causing this congestion. It may be due to the reason of low bandwidth or high traffic on a single route. So, routing protocol being used heavily impacts the Quality of service of networking. It depends on how efficient a routing algorithm is to detect the traffic on a particular route and to choose a route accordingly to ... Read More

What are security threats? Differentiate between wired and wireless threats

Bhanu Priya
Updated on 16-Sep-2021 06:57:08

592 Views

In computer system and internet technology management, the following may be the security threatsHardware may cause minor threats in most of the situations. It is unable to control the Leaked information.The software threat harms critical data of an organization.Hacking is one of the biggest threats now-a-days. Through malicious programs hackers steal critical information from others.The unauthorized use of personal data is one of the threats.Phishing attacks by malware email to multi-internet users for mid guiding them.Spoofing is also a bigger threat of technology.Methods to secure a networkGiven below are the methods to secure a network −A network can be secured ... Read More

What is QOS and mobile and network QOS?

Bhanu Priya
Updated on 16-Sep-2021 06:56:10

1K+ Views

Let us understand the concept of Quality of Service (QoS) in networking.QOS in terms of networkingQuality of service (QoS) in the case of networking implies the ability of a network to provide reliable service to the traffic over various technologies including Ethernet, wireless, IP, Asynchronous Mode etc.QOS in case of network congestion has to keep in record various elements causing this congestion. It may be due to the reason of low bandwidth or high traffic on a single route.So, routing protocol being used heavily impacts the Quality of service of networking.It depends on how efficient a routing algorithm is to ... Read More

What is BGP and why do we need it?

Bhanu Priya
Updated on 16-Sep-2021 06:54:35

2K+ Views

BGP stands for Border Gateway Protocol. It can be defined as a standardized exterior gateway protocol which is developed to interchange routing information and reachability information between various autonomous systems (AS) on the Internet. It is classified as a path vector protocol as well as a distance-vector routing protocol.Types of BGPThere are two types of BGP and they are as follows −Internal BGP − Internal BGP (IBGP) is a BGP connection between BGP speakers in the same AS.External BGP − External BGP (EBGP) is a BGP connection between BGP speakers in different AS’s.Message TypesThere are four message types of BGP ... Read More

Advertisements