Bhanu Priya

Bhanu Priya

1,061 Articles Published

Articles by Bhanu Priya

Page 17 of 107

What is RPC Implementation?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

Remote Procedure Call (RPC) is a protocol that allows a program running on one computer to execute procedures or functions on another computer across a network. The calling program doesn't need to understand the underlying network details, making remote operations appear as local function calls. RPC abstracts the complexity of network communication, enabling distributed applications to interact seamlessly across different systems and networks. Applications of RPC RPC is widely used in various systems and applications: Active Directory service − Windows uses RPC for domain authentication and directory services. MMC terminals − Microsoft ...

Read More

What is a Domain Name System?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

The Domain Name System (DNS) is a hierarchical and decentralized naming system that translates human-readable domain names into machine-readable IP addresses. It serves as the internet's phonebook, enabling users to access websites using memorable names like www.example.com instead of complex numeric addresses like 192.168.1.1. DNS operates using the User Datagram Protocol (UDP) on port 53 and relies on a distributed network of DNS servers to resolve domain names efficiently across the global internet. How DNS Works When you type a domain name into your browser, DNS performs the following translation process: Step 1 − Your browser ...

Read More

Differentiate between domain and domain name server and components of DNS

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

The main difference between domain and domain name server (DNS) is that a domain is a unique identification string that helps identify a specific website, while DNS (Domain Name System) is a distributed system that translates domain names to their corresponding IP addresses to deliver the requested webpage. There are millions of websites on the World Wide Web including educational, e-commerce, government, and entertainment sites. Each website must have its own unique domain name to identify it on the internet. When a user enters a domain name in their browser, the DNS converts that name to the matching IP ...

Read More

What is a DNS Name Resolution and explain the cache poisoning attack in DNS?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 527 Views

The Domain Name System (DNS) is a fundamental internet service that translates human-readable domain names into IP addresses. DNS name resolution is the process by which this translation occurs, enabling users to access websites using memorable names instead of numerical IP addresses. How DNS Name Resolution Works When a program needs to translate a domain name into an IP address, it contacts a DNS server to perform the resolution. However, this process rarely occurs at a single DNS server. Instead, the initial DNS server recursively queries other DNS servers in a hierarchical manner to complete the translation. ...

Read More

What is Authentication Header (AH) format?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 17K+ Views

Authentication Header (AH) is a security protocol used in IPSec to provide data integrity, authentication, and replay protection to IP datagrams. The services are connectionless, meaning they work on a per-packet basis without maintaining connection state. AH operates in two modes: transport mode (protecting payload only) and tunnel mode (protecting the entire original IP packet). However, AH cannot protect certain IP header fields that change during transit, called mutable fields. Mutable IPv4 Fields The following IPv4 header fields are considered mutable and are not protected by AH: Type of Service (TOS) − Can be modified ...

Read More

What is Encapsulating Security Payload(ESP)?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 14K+ Views

Encapsulating Security Payload (ESP) is a core protocol in IPSec that provides confidentiality, integrity, and authentication for IP packets. Unlike Authentication Header (AH), ESP encrypts the payload data to ensure privacy and protection against eavesdropping and data tampering. ESP operates in two modes: Transport Mode (protects only the payload) and Tunnel Mode (protects the entire original IP packet by encapsulating it within a new packet). The protocol uses industry-standard algorithms such as SHA and MD5 for authentication and various encryption algorithms for confidentiality. How ESP Works ESP transforms readable data into an unreadable encrypted format using symmetric ...

Read More

What are the differences between Physical and Logical Topology?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 23K+ Views

Network topology refers to the arrangement and interconnection of network devices. Understanding network topology is crucial for network design, troubleshooting, and optimization. There are two fundamental ways to view network topology: physical topology and logical topology. Physical topology describes the actual physical layout and connections of network devices, while logical topology describes how data flows through the network regardless of the physical connections. Physical vs Logical Topology Physical Topology ...

Read More

What is ESP in tunnel and transport mode and the difference between AH and ESP?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

Encapsulating Security Payload (ESP) is one of the two main protocols in IPSec that provides encryption, authentication, and integrity services for IP packets. ESP protects the data payload through encryption while ensuring data integrity and authenticity using cryptographic algorithms. ESP operates in two distinct modes: transport mode for host-to-host communication and tunnel mode for network-to-network communication. The choice of mode determines which parts of the IP packet are protected and how the packet structure is modified. ESP in Transport Mode In transport mode, the ESP header is inserted directly after the original IP header, and the ESP ...

Read More

Differentiate between 4G and 5G cellular Networks

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

A cellular network is a fundamental technology for mobile phones, personal communication systems, and wireless networking. The technology uses lower power transmitters with shorter range coverage areas called cells, enabling efficient spectrum reuse and supporting millions of simultaneous users across a geographic region. Both 4G and 5G represent major evolutionary steps in cellular technology, each offering distinct capabilities and addressing different communication needs. Understanding their differences helps in appreciating the technological advancement and choosing the right network for specific applications. 4G vs 5G Cellular Networks 4G ...

Read More

What is evolutionary process of cellular networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 3K+ Views

Cellular networks form the backbone of modern mobile communication, enabling voice calls, data transmission, and internet connectivity for billions of devices worldwide. These networks evolved from simple radio telephone systems to sophisticated digital infrastructures that power today's smartphones and IoT devices. The evolutionary journey of cellular networks spans over seven decades, with each generation bringing significant improvements in speed, capacity, and functionality. Understanding this evolution helps appreciate how mobile technology transformed from basic voice communication to the high-speed data networks we rely on today. Cellular Network Evolution Timeline ...

Read More
Showing 161–170 of 1,061 articles
« Prev 1 15 16 17 18 19 107 Next »
Advertisements