Bhanu Priya

Bhanu Priya

1,060 Articles Published

Articles by Bhanu Priya

Page 59 of 106

What is the Default Gateway?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 4K+ Views

A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway is to pass the information to another router when the current packet does not know the destination.It is a node or a router in the network that connects the host to remote network components.Whenever a packet needs to be transmitted to another network, the packet must pass through the default ...

Read More

What is the role of NAT and PAT in making internet routing more efficient?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 885 Views

The two address translations that are helpful to make internet routing more efficient are NAT (Network address translation) and PAT (Port address translation).Let us discuss the two translation schemes.Network Address Translation (NAT)NAT is used to convert a private IP address into a public IP address and also a public IP address into a private IP address. We use NAT due to the shortage of IP addresses.IP Version 4 is a 32- bit address and it has almost 4.3 billion IP addresses, but the population of the world is much higher and it is approximately about 7.8 billion as of the ...

Read More

What are risks in implementing the RSA algorithm without padding?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 2K+ Views

The RSA algorithm stands for Rivest-Shamir-Adelman algorithm. RSA algorithm is the most commonly used public key algorithm and this algorithm can be used both for encryption and for signing.RSA uses a variable size encryption block and variable size key. The key pair is derived from a very large number say n that is the product of two large prime numbers selected through special rules.The public key includes n and derives one of the factors of n, an adversary cannot determine the prime factor of n, from this information alone, makes the RSA algorithm so secure.Hence, it is generally considered to ...

Read More

What are the ways of security implementation in storage networks?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 751 Views

The different ways of security implementations in storage network includes the following −An overall IT and security risk assessment study has been completed including threat probabilities and overall business impacts.This will set a context and basis to develop a credible storage network security plan.Overall IT security objectives and advised spending levels and budgets are in place so that a storage security plan can be developed in context.Requirements for compliance reporting have been established so that the storage network security implementations can give the overall reporting system.Types of Storage network security implementationsAccordingly, there are three types of storage network security implementations ...

Read More

What are issues and solutions related to TCP in networks?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 1K+ Views

Some the issues and solution related to Transmission Control Protocol (TCP) are as follows −Silly window syndrome.Congestion window management.Silly Window SyndromeThis is a problem which arises in TCP flow control. In this the sender window size shrinks to an extremely low value due that the data being sent in each trip is even smaller than the TCP header. Due to which TCP protocol becomes extremely inefficient.CausesThe silly window syndrome can occur due to two main reasons, which are as follows −The application which needs to send the data produces a short amount of data (1 byte), again and again and ...

Read More

What is Silly Window Syndrome in TCP?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 5K+ Views

TCP is a transmission control protocol and a connection-oriented protocol. It provides a flow control and error control facility for information in between the sender and the receiver.A protocol which will be used in the data link layer which will support the reliable and sequential delivery of data frames. This protocol is the sliding window protocol.This sliding window facility is also used with the TCP which helps to transfer multiple frames by a sender at a time before receiving an acknowledgment from the receiver.The TCP will maintain a proper data flow.If the sender data transmitting speed will be high compared ...

Read More

What are flooding, static routing and dynamic routing?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 1K+ Views

Let us begin by understanding the concept of flooding.FloodingFlooding does not require any network information like topology, load condition and cost of different paths.Here, every incoming packet to a node is sent out on every outgoing line except the one it arrived on.In this case all possible routes between Source and Destination will be tried. If a path exists a packet will always get through.Since routes are tried, we can see at least one route which is the shortest.All nodes that are indirectly or directly connected are visited.Some limitations include generation of large numbers of duplicate packets. Also, we must ...

Read More

What are subnets and subnet masks in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 13K+ Views

Subnet Mask is used in networking to create multiple sub networks in a network. It divides the IP address into multiple parts which can be assigned to every computer. Subnet Mask is made by setting the network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for a special purpose, and cannot be assigned to hosts.The binary "0" in the subnet mask tell us about the host address. It tells us about the IP of the host which has done subnetting.ExampleSuppose we have a subnet address as 192.168.1.0. In ...

Read More

What are the most popular wireless internet access technologies?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 2K+ Views

The two of the most popular wireless Internet access technologies are Wireless LAN and Wide-area wireless access network. Let us understand both of them in detail.WLAN (wireless local area network)WLAN uses locally placed radio transmitters (base stations) to provide Internet technology. The end devices that are equipped with radio transceivers exchange data with these base stations.The range of WLAN is limited to a few tens of meters.Wired Internet is used to connect these base stations to the internet network and thus the base station allows the users of the WLAN to get connected to the worldwide internet.WLAN is used for ...

Read More

How NAT improves the security of Network?

Bhanu Priya
Bhanu Priya
Updated on 15-Sep-2021 2K+ Views

Network Address Translation (NAT) is used to convert a private IP address into a public IP address and also a public IP address into private IP address. We use NAT due to the shortage of IP addresses.IP Version 4 is a 32- bit address and it has almost 4.3 billion IP addresses, but the population of the world is much higher and it is approximately 7.8 billion as of the latest reports of June 2020.Most of them use multiple gadgets and devices like smartphones, laptops, tablets, and many more for accessing the internet for various needs. All these devices need ...

Read More
Showing 581–590 of 1,060 articles
« Prev 1 57 58 59 60 61 106 Next »
Advertisements