Bhanu Priya

Bhanu Priya

1,060 Articles Published

Articles by Bhanu Priya

Page 56 of 106

What are security threats? Differentiate between wired and wireless threats

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 638 Views

In computer system and internet technology management, the following may be the security threatsHardware may cause minor threats in most of the situations. It is unable to control the Leaked information.The software threat harms critical data of an organization.Hacking is one of the biggest threats now-a-days. Through malicious programs hackers steal critical information from others.The unauthorized use of personal data is one of the threats.Phishing attacks by malware email to multi-internet users for mid guiding them.Spoofing is also a bigger threat of technology.Methods to secure a networkGiven below are the methods to secure a network −A network can be secured ...

Read More

What is QOS and mobile and network QOS?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 1K+ Views

Let us understand the concept of Quality of Service (QoS) in networking.QOS in terms of networkingQuality of service (QoS) in the case of networking implies the ability of a network to provide reliable service to the traffic over various technologies including Ethernet, wireless, IP, Asynchronous Mode etc.QOS in case of network congestion has to keep in record various elements causing this congestion. It may be due to the reason of low bandwidth or high traffic on a single route.So, routing protocol being used heavily impacts the Quality of service of networking.It depends on how efficient a routing algorithm is to ...

Read More

What is BGP and why do we need it?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 2K+ Views

BGP stands for Border Gateway Protocol. It can be defined as a standardized exterior gateway protocol which is developed to interchange routing information and reachability information between various autonomous systems (AS) on the Internet. It is classified as a path vector protocol as well as a distance-vector routing protocol.Types of BGPThere are two types of BGP and they are as follows −Internal BGP − Internal BGP (IBGP) is a BGP connection between BGP speakers in the same AS.External BGP − External BGP (EBGP) is a BGP connection between BGP speakers in different AS’s.Message TypesThere are four message types of BGP ...

Read More

What is CIDR and how it works?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 14K+ Views

Classless Inter-Domain Routing (CIDR) is a group of IP addresses that are allocated to the customer when they demand a fixed number of IP addresses.In CIDR there is no wastage of IP addresses as compared to classful addressing because only the numbers of IP addresses that are demanded by the customer are allocated to the customer.The group of IP addresses is called Block in Classless Inter - Domain (CIDR).CIDR follows CIDR notation or Slash notation. The representation of CIDR notation is x.y.z.w /n the x.y.z.w is IP address and n is called mask or number of bits that are used ...

Read More

What is DSL technology and differentiate between DSL modem and DSLAM?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 2K+ Views

The DSL technology is defined as the digital subscriber lines. Here, the data is transmitted to the users over the telephone signal lines.Voice communication over the telephone is the best example of the digital subscriber lines. Also, there are DSL services that are provided by DSL technology.Here there is asymmetric and symmetric digital subscriber line both are supported by the DSL network.The services provided by the companies that provide the DSL are −The broadband internet connectionVoice communicationVideo streaming at low speed is offered by the companies using the DSL network.Purpose of DSLThe purposes of DSL are explained below −DSL is ...

Read More

What are the different types of ISDN?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 4K+ Views

ISDN stands for integrated service digital network. It is a telephone switched network which integrates voice and data over a digital line simultaneously. It also provides packet switched networks.ISDN supports a variety of services which are as follows −Voice callsVideo textsElectronic mailDatabase accessFacsimileTeletextData transmission and voiceConnection to internetElectronic Fund transferImage and graphics exchangeDocument storage and transferAudio and Video ConferencingThe figure given below depicts ISDN −Channels of ISDNISDN has mainly three channels, which are as follows −B-channel − It offers a speed of around 64kbps, which can be used for home purpose.D-channel − It offers speeds ranging from 16 to 64 ...

Read More

Differentiate between piconet and scatternet

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 17K+ Views

Let us understand the concept of piconet and scatternet before learning the differences between them.PiconetA piconet is a network created by connecting multiple wireless devices using Bluetooth technology. In a piconet network a master device exists, this master device cm gets connected to 7 more slave devices.It includes the master the number of devices that can be connected is limited to 8. Due to less number of devices active at a time the usage of channel band width is not more.Number of devices that can be connected is limited to 8. It is applicable for devices belonging to small areas.Given ...

Read More

What are the types of ICMP message types?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 5K+ Views

Internet Control Message Protocol (ICMP) shares error reporting and device status messages which can be further divided into specific message types with their codes.These message types can be divided into two categories −Error Reporting MessagesQuery MessagesThese message types are shown below −Error Reporting MessagesThese are messages which are sent when an error is reported by ICMP protocol.Some of common messages under this category are as follows:Destination Unreachable (Type 3)One of the most common error reporting messages occurs when the router is unable to locate the path of the packet where it is needed to be delivered and in this case ...

Read More

What are security issues in IP protocol?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 3K+ Views

There are three security issues that are applicable to the IP protocol −Packet SniffingPacket ModificationIP SpoofingLet us discuss each issue in detail.Packet SniffingA guest may intercept an IP packet and create a copy of it.The packet sniffing is generally a passive attack, where the attacker does not change the contents of the packet.Packet sniffing attack is difficult to detect because here the sender and receiver doesn’t know that the packet has been copied.Even though the packet sniffing cannot be stopped, the encryption of the packet can make the attacker’s effort useless. Still the attackers may sniff the packet, but the ...

Read More

What are issues in congestion and Flow control in LANs?

Bhanu Priya
Bhanu Priya
Updated on 16-Sep-2021 638 Views

Let us understand the concept of flow control and congestion control.Flow controlIt is handled by a receiving side and it safeguards that a sender can only send something that a receiver can control or handle.Flow control handles a mechanism available to safeguard that communication flows smoothly.For example, a situation where somebody has a quick fiber connection could be sending on something or dial up similar. A sender could have the capability to send packets quickly, however that can be useless to a receiver on dialup. Thus they require a method to throttle the sending side.The issues related to flow control ...

Read More
Showing 551–560 of 1,060 articles
« Prev 1 54 55 56 57 58 106 Next »
Advertisements