Found 73 Articles for Server

What is NBP?

Bhanu Priya
Updated on 21-Mar-2022 12:38:48
The Name Binding Protocol (NBP) allows you to bind a name to the internal storage address of the entity and register that mapping so that other entities can follow.An NBP name was displayed by the applications to the users and used addresses internally to locate entities. When we register the entity's name and address, NBP validates its uniqueness.Generally, an entity name consists of three fields, which are as follows −The object − Object field is used to identify the user of the system. Because of the applications this value is set to the owner name, where the user specifies with ... Read More

What is Transport Layer Security (TLS) Handshake?

Bhanu Priya
Updated on 21-Mar-2022 12:33:53
Transport layer security protocol is one of the security protocols which are designed to facilitate privacy and data security for communications over the Internet. The main use of TLS is to encrypt the communication between web applications and servers, like web browsers loading a website.TLS is used to encrypt other communications like email, messaging, and voice over IP (VoIP). TLS was proposed by the Internet Engineering Task Force (IETF), which is an international standards organization.ComponentsThe three main components that TLS accomplishes are as follows −Encryption − It is used to hide the data being transferred from third parties.Authentication − It ... Read More

What are the types of Virtual LAN (VLAN)?

Bhanu Priya
Updated on 21-Mar-2022 12:29:13
A VLAN is called a subnetwork that can group together devices on separate physical local area networks. A LAN is a group of computers or devices that share a communications line/wireless link to a server within the same geographical area.VLANs provide security on larger networks by allowing a higher degree of control over which devices have access to each other. They are flexible because VALNs are based on logical connections, rather than physical.Working of VLANWhen a switch receives an Ethernet frame, the frame will either already have a VLAN tag or switch will insert a VLAN tag into the Ethernet ... Read More

What are the types of Transmission Technology?

Bhanu Priya
Updated on 21-Mar-2022 12:31:19
The transmission technologies are divided into two types −Broadcast networks andPoint-to-point networks.Let us begin by learning about broadcast networks.Broadcast NetworksTransmitting data from one source host to all other hosts present in the same or other network is called broadcast. It is called a one to all transmission.Types of broadcastBroadcast is classified into two types, which are as follows −Limited BroadcastTransmitting data from one source host to all other hosts present in the same network is called a limited broadcast. Given below is the diagram of limited broadcast −In Limited Broad casting if the destination address is then the packet ... Read More

What is Internet Relay Chat (IRC)?

Bhanu Priya
Updated on 21-Mar-2022 12:25:13
The Internet Relay Chat is a protocol used for live interactive internal text messaging or simultaneous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication messages as well as chat and data transfer including file sharing.IRC is the way of communicating in real time with people from all over the world. IRC has separate networks like IRC servers, machines which allow users to connect to IRC.Working of IRCGenerally, the user runs a program to connect to a server on one of the IPC nets.The server relays information to and forms other ... Read More

What is a Proxy Server?

Bhanu Priya
Updated on 21-Mar-2022 11:37:12
A proxy server is a computer that offers a service to allow clients to make indirect network connections to the other network services. A client connects to the proxy server, and then requests a connection, file, or other resource available on a different server.Then the proxy provides the required resource either by connecting to the specified server or by obtaining through its cache.AdvantagesThe advantages of a proxy server are as follows −It helps the clients to protect their important information from getting hacked by hackers.The proxy server is also used to enhance the security and privacy level of the client's ... Read More

What is a Distributed Component Object Model (DCOM)?

Bhanu Priya
Updated on 21-Mar-2022 11:27:41
DCOM is an extension of the Component Object Model (COM). Component Object Model explains how components and their clients interact. This interaction is the way the client and the component can connect without the need of any intermediary system component.Suppose when client and component are present on different machines, DCOM replaces the local Inter-process communication with a network protocol.Neither the client nor the components are aware that the wire that connects them has just become a little longer.The COM run-time provides object-oriented services to clients and components and uses RPC and the security provider to generate standard network packets that ... Read More

What is early token release and delayed token release?

Bhanu Priya
Updated on 21-Mar-2022 11:22:57
Token ring is a physical unidirectional ring, where the systems are connected to the ring through some interface.In the token ring a special frame is called a token which is always circulated on the ring. If a system has to transmit then it needs to acquire the token without a token no system can transmit. Only one system can transmit at a time. Hence it is collision free protocol.The token ring source is responsible for removing the frame from the ring. In normal token ring operation, a station sending information holds the token until the sending data circles the entire ... Read More

What is a Network and process of Network Communications?

Bhanu Priya
Updated on 21-Mar-2022 11:17:20
Network is a connection of two or more systems which are used to share resources and information.Network CommunicationFlow of information among the group of members is a communication network. Network helps managers to establish contacts in different patterns through communication flows.The network depends on the magnitude of the organisation, nature of communication channels in the organisation and the number of persons involved in the process. There can be many patterns of communication networks.Function of Communication devicesThe functions of communication networks include the following −It is the way of coordinating the activities of individuals, relationships, groups and other sub-units within the ... Read More

What are the differences between Firewall and Proxy Server?

Bhanu Priya
Updated on 21-Mar-2022 11:10:57
To begin with, let us learn the concepts of firewall and proxy server.FirewallIt is used to provide security, mostly from external networks such as the Internet. It is the combination of software and hardware to allow, deny, monitor, and block any and all data transmissions occurring from a specified internal network.Firewalls evaluate, allow, or deny network traffic based on certain predefined rules set-up based on IP addresses or its range, port numbers, protocols, and few other factors. It provides good traffic management.Firewalls defend against external threats refusing or denying unauthorized requests, transmissions, and connections to the router, network, application software, ... Read More