Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Network Articles - Page 71 of 79
4K+ Views
OSI represents Open System Interconnection. It was produced by the International Organization for Standardization (ISO) located in Geneva, Switzerland, and the consultative committee for international Telephone and Telegraph (CCITT).OSI was created to develop a frequent standard of network structure throughout the globe. It supports a general idea of inter-process communication so that any open system can technically connect with another accessible framework without any issues. OSI model is a seven-layered architecture model.Advantages of the OSI ModelThe advantages of the OSI Model are as follows −The OSI models clearly define the services, interfaces and protocols. It explains which layer's services are supported. ... Read More
1K+ Views
The presentation layer changes the data from an application layer into the device native internal mathematical structure and encodes communicated information into a displayable output format.It executes the code changes, document compressions, security encryption, etc. It also defines the data as per the software/hardware environment of the hub. For instance, demonstrating UNIX structured data in windows.The link between the presentation layer and the application and session layer has been shown in the diagram below −It is concerned with the syntax of data.TranslationThe procedure in two frameworks are generally to exchange the data in the form of character strings, numbers etc. ... Read More
967 Views
The session layer supports establishing, controlling, and eliminating a session or dialogue between the two end frameworks. It generates the session, handles the packets sent back and forth during the session and removes the session. The dialogue type/session type is also defined through half-duplex or full-duplex.The session layer also supports data synchronization and check pointing so that only the information transmitted after the point of failure should be retransmitted in the event of network failure.This layer also governs the dialogue between the two processes by deciding who can send and who can get at what point during the transmission.The session ... Read More
3K+ Views
Physical layer is the shortest layer in the model. This layer is feasible for initiating, preserving, and deactivating a physical circuit between two end frameworks.The Physical Layer is vital for transmitting bits from one device to another device. It can change the series of bits into electric signals, light signals, or electromagnetic signals, relying on either the two hubs on a link circuit, fiber-optic circuit, or microwave/radio circuit.Passive hubs, simple active hubs, terminators, couplers, cables, connectors, repeaters, multiplexers, transmitters and receivers are the devices associated with the physical layer.The physical layer situation for the transmission channel and the data link ... Read More
5K+ Views
OSI represents Open System Interconnection. The OSI reference model is a seven-layered architecture and is created in a hugely structured method. Each layer in the model has specific sets of procedures, functions, and protocols. One layer can communicate with an adjacent layer by using its interface.OSI model was advanced by the International Organization for Standardization (ISO) in Geneva, Switzerland, and by the Consultative Committee for International Telephone and Telegraph (CCITT).The figure given below displays the seven-layered Architecture of OSI Models, along with the protocols and interfaces.Functions of the OSI LayersThere are various functions of OSI Layers which are as follows:Physical LayerThis ... Read More
5K+ Views
Both Hubs and Bridges are network connecting devices and both of them broadcast data to every node on a network. Hubs operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Bridges connect various devices in a network.A bridge operates at the data link layer to connect multiple networks. It can read the outmost section of a data packet to tell where the message is going. A bridge can be programmed to reject packets from a particular network, so it can be used to reduce ... Read More
3K+ Views
A VPN connects a private network to another public network, which allows users to transmit and receive data as if their computers were connected to the private network physically.MPLS is a routing technique that is used to improve the speed and control of the network traffic. It speeds up traffic flows by avoiding complex lookups in the routing table at each node as in conventional routing algorithms.Read through this article to find out more about MPLS and VPN and how they are different from each other.What is VPN?VPN stands for virtual private networks. It is a network type that is ... Read More
6K+ Views
Both URL and Domain Name are two very common terms related to the Internet or web address. Sometimes, these are used interchangeably, but they are entirely different from each other. URL (Uniform Resource Locator) is the complete address of a web resource such as a webpage, whereas the Domain Name is the part of a URL that represents an IP address in a human friendly form. Read this article to find out more about URL and Domain Name and how they are different from each other. What is URL? A URL is a complete Internet address of a web ... Read More
1K+ Views
Both these terms "cybersecurity" and "network security" are related to security measures that organizations employ to protect their data, systems, and network infrastructure from online threats. However, cybersecurity is used in a much broader sense, while network security is a subset of cybersecurity. Read through this article to find out more about cybersecurity and network security and how they are different from each other.What is Cybersecurity?Cyber security refers to the use of technology, methods, and policies to reduce the danger of cyber-attacks while also protecting the systems, networks, programs, devices, and data from unwanted access.The field of cybersecurity is becoming ... Read More
44K+ Views
In computers, an address is used to identify a location in the computer memory. In operating systems, there are two types of addresses, namely, logical address and physical address. A logical address is the virtual address that is generated by the CPU. A user can view the logical address of a computer program. On the other hand, a physical address is one that represents a location in the computer memory. A user cannot view the physical address of a program. Read this article to find out more about logical and physical address and how they are different from each other. ... Read More