Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Page 29 of 94
What are the basic building blocks of IPSec VPN tunnelling?
The basic building blocks of the IPsec vpn tunnelling are as follows −Authentication header − it is used to verify the identity of the sender of the data and to check whether it is altered or not. It ties data in every data packet to a verifiable signature. It is used for the purpose of authentication.Encapsulating security payload − the data in the data packet is scrambled by using the encryption technique to prevent the sniffing attacks. It ensures the confidentiality of the data as the data is encrypted and not being able to be understood by anyone except the ...
Read MoreWhat are network troubleshooting tools?
The network troubleshooting tools are classified into two types −Hardware toolsThe hardware tools included in the network troubleshooting are explained below −Cable testerIt is also known as a media tester. It is used to test whether the cable works properly or not. The cable testers will confirm whether a cable works correctly and if there is a problem with the cable. Tools which are used for testing of the cable can be classified as a cable tester.Protocol analyserThis tool is used to analyse the network protocols like UDP, TCP, and FTP etc. This acts as a software as well as ...
Read MoreWhat are security features of the 4G cellular network?
4G cellular network is actually the fourth generation of cellular communications.Features of 4GIt comes up with many features which are given below −10x high speed as compared to 3GThe cost is also less for each bit used.It is highly secured too.It comes up with LTE i.e. Long term evaluation which refers to high-speed data connection for mobile devices.Now let us talk about the security features of 4G.Security features of the 4G cellular networkSecurity features are the different types of security measures a 4G network possesses such as the following −Configuration of security − It is the most beautiful feature of ...
Read MoreWhat are VLAN, NAT and private IP’s in computer networks?
Let us begin by learning about Virtual LAN (VLAN).Virtual LAN (VLAN)VLANs are logical grouping of devices which are in the same broadcast domain. Computers, servers, network devices are connected logically and their physical location don't matter. We use VLANs to manage traffic, to make the security improved.A VLAN is used when multiple LAN devices are connected to each other, where each can sneak into the data transmitted by two devices, can be seen by a third device and security can be breached.A VLAN will make sure that the data is kept only between two devices. It can be used to ...
Read MoreWhat is big data?
In simple language, big data is a collection of data that is larger, more complex than traditional data, and yet growing exponentially with time. It is so huge that no traditional data management software or tool can manage, store, or can process it efficiently. So, it needs to be processed step by step via different methodologies.The Applications of Big Data areBanking and SecuritiesCommunications, Media and EntertainmentHealthcare ProvidersEducationManufacturing and Natural ResourcesGovernmentInsuranceRetail and Wholesale tradeTransportationEnergy and UtilitiesThe Uses of Big Data areLocation TrackingPrecision MedicineFraud Detection & HandlingAdvertisingEntertainment & MediaReal World Big Data ExamplesDiscovering consumer shopping habits.Personalized marketing.Fuel optimization tools for the transportation ...
Read MoreWhat are the general techniques to improve the quality of service?
Quality of service (QoS) in the case of networking implies the ability of a network to provide reliable service to the traffic over various technologies including Ethernet, wireless, IP, Asynchronous Mode etc.QOS in case of network congestion must keep in record various elements causing this congestion. It may be due to the reason of low bandwidth or high traffic on a single route. So, routing protocol being used heavily impacts the Quality of service of networking. It depends on how efficient a routing algorithm is to detect the traffic on a particular route and to choose a route accordingly to ...
Read MoreWhat are security threats? Differentiate between wired and wireless threats
In computer system and internet technology management, the following may be the security threatsHardware may cause minor threats in most of the situations. It is unable to control the Leaked information.The software threat harms critical data of an organization.Hacking is one of the biggest threats now-a-days. Through malicious programs hackers steal critical information from others.The unauthorized use of personal data is one of the threats.Phishing attacks by malware email to multi-internet users for mid guiding them.Spoofing is also a bigger threat of technology.Methods to secure a networkGiven below are the methods to secure a network −A network can be secured ...
Read MoreWhat is QOS and mobile and network QOS?
Let us understand the concept of Quality of Service (QoS) in networking.QOS in terms of networkingQuality of service (QoS) in the case of networking implies the ability of a network to provide reliable service to the traffic over various technologies including Ethernet, wireless, IP, Asynchronous Mode etc.QOS in case of network congestion has to keep in record various elements causing this congestion. It may be due to the reason of low bandwidth or high traffic on a single route.So, routing protocol being used heavily impacts the Quality of service of networking.It depends on how efficient a routing algorithm is to ...
Read MoreWhat is BGP and why do we need it?
BGP stands for Border Gateway Protocol. It can be defined as a standardized exterior gateway protocol which is developed to interchange routing information and reachability information between various autonomous systems (AS) on the Internet. It is classified as a path vector protocol as well as a distance-vector routing protocol.Types of BGPThere are two types of BGP and they are as follows −Internal BGP − Internal BGP (IBGP) is a BGP connection between BGP speakers in the same AS.External BGP − External BGP (EBGP) is a BGP connection between BGP speakers in different AS’s.Message TypesThere are four message types of BGP ...
Read MoreWhat is CIDR and how it works?
Classless Inter-Domain Routing (CIDR) is a group of IP addresses that are allocated to the customer when they demand a fixed number of IP addresses.In CIDR there is no wastage of IP addresses as compared to classful addressing because only the numbers of IP addresses that are demanded by the customer are allocated to the customer.The group of IP addresses is called Block in Classless Inter - Domain (CIDR).CIDR follows CIDR notation or Slash notation. The representation of CIDR notation is x.y.z.w /n the x.y.z.w is IP address and n is called mask or number of bits that are used ...
Read More