Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Page 31 of 94
What is switching and the types of switching techniques?
Switching is a technique of transferring the information from one computer network to another computer network.Let us discuss about switching in step by step manner as follows −Step 1 − In a computer network the switching can be achieved by using switches.Step 2 − A switch is a small piece of hardware device that is used to join multiple computers together with one local area network (LAN).Step 3 − These are devices which are helpful in creating temporary connections between two or more devices that are linked to the switch.Step 4 − Switches are helpful in forwarding the packets based ...
Read MoreWhat are Satellite Microwaves in computer networks?
There are two types of microwaves in computer networks. These are as follows −Terrestrial microwaveSatellite microwaveLet us discuss satellite microwaves in detail.Satellite MicrowaveIt is used for broadcasting and receiving signals. The signals are transmitted to space where these satellites are positioned and it retransmits the signal to the appropriate location.It acts as a repeater as it only receives the signal and retransmits it. The satellites should be aligned properly with the earth for this system to work. It is a physical object which revolves around the earth at a known height.Satellite communication is more flexible and reliable nowadays than cable ...
Read MoreWhat is simplex mode of transmission in computer networks?
When a data is transmitted from one device to another device is known as transmission mode, it is also known as the communication mode.Generally, the communication channel is a direction associated, and transmission media role is to provide the direction. So, we call transmission mode a directional mode.The transmission mode is work in the physical layer.Types of Transmission modeThe Transmission mode is divided into three categories, which are as follows −Simplex ModeHalf-duplex ModeFull-duplex mode (Duplex Mode)The types of transmission mode are shown in the chart below −Let us see the simplex mode of transmission.Simplex modeIn Simplex mode, the communication is ...
Read MoreWhat are wireless sensor networks?
Wireless sensor networks (WSNs) have the power of distributed communication, computing, and sensing features. They are characterized as infrastructure less, fault tolerant and self-organizing networks which provide opportunities for low-cost, easy-to-apply, rapid and flexible installations in an environment for various applicationsThe wireless sensor and the sensor node architecture are given in the diagram below −Characteristics of WSNThe characteristics of WSN are as follows −Resource constraints − Nodes of WSN are smaller in size and get power from the batteries. It justifies that service provided by the nodes like communication and computation amount of memory is very limited.Communication paradigm − The ...
Read MoreWhat is client/server network and types of servers?
Local Area networks are of two types − Peer to Peer network and client server network.Let us discuss about client server network −Client/Server NetworkIn client-server network relationships, certain computers act as servers and others act as clients.A server is simply a computer that provides the network resources and provides service to other computers when they request it. A client is the computer running a program that requests the service from a server. Local area network (LAN) is based on client server network relationship.A client-server network is one on which all available network resources such as files, directories, applications and shared ...
Read MoreWhat is the process of securing the network architecture using TSL, SSL, and Cryptography?
TLS (Transport layer security) is the successor or the updated version of SSL and the basic process of securing the network by both is more or less the same.Transport Layer Security (TLS)/Secure Sockets Layer (SSL) are computer networking protocols for securing connections between network application clients and servers over an insecure network. These protocols provide a mechanism for encrypting and authenticating data sent between client and server.SSL/TLS layers are responsible for the transport of data between processes and the routing of network traffic over a network between client and server, and below application layer protocols such as Hypertext Transfer Protocol ...
Read MoreWhat are Logical Link Control (LLC) and Medium Access Control(MAC)?
Logic Link Control (LLC) Layer and Medium Access Control (MAC) layers are the sublayers of the Data link layer in the OSI reference model.OSI reference model: It stands as Open Systems Interconnection. OSI is a 7 layer architecture which contains 7 layers. Each layer has its own specific functionality. All these 7 layers in the OSI model are used to transmit data.Data Link LayerIn computer networking, the data link layer is the 2nd layer of the OSI reference model. The main function of this layer is to transmit data between nodes. The data link layer transmits data between network entities ...
Read MoreWhat are the most used network troubleshooting tools?
The network troubleshooting tools are useful for every network administrator. These tools can be used to troubleshoot different network conditions.The network troubleshooting tools which are most used are as follows −RouteThe route utility is helpful to display the status of the routing table on host. The route utility is limited at the situations where the host has one ip address with one gateway. The route plays a key role at multiple IP addresses and multiple gateways.pathping / mtrThe pathping and meter utilities take the information obtained from tools and provide a more detailed picture of the characteristic path from particular ...
Read MoreHow does the IPsec use digital certificates and digital signatures?
IPSec is one of the secure techniques on the market for connecting network sites.IPSec was designed to supply the subsequent safety features once transferring packets across networks the following factors −Authentication − Verifies that the packet received is truly from the claimed sender.Integrity − Ensures that the contents of the packet didn't amend in transit.Confidentiality − Conceals the message content through secret writing.Use of Digital CertificateIt is explained below how IP security (IPsec) makes use of Digital Certificate.A digital certificate is an associate electronic document issued by a Certificate Authority (CA). It contains the general public key for a digital ...
Read MoreWhat is SD-WAN and its working condition?
Mostly in the digital age, an enterprise Software-defined Wide Area Network (SD-WAN) can modernise your network and propel your business, while a single centralised SD-WAN can unify network connectivity and allow application delivery to be coordinated across an entire network.A WAN is a link separated by a significant distance between local area networks (LANs), anything from a few miles to thousands of miles. The word software-defined means the WAN is designed and managed programmatically. Therefore, it can be easily modified to meet evolving needs rapidly.Given below is the diagram of SD-WAN −Features of SD-WANThere are some features commonly attributed to ...
Read More