
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Bhanu Priya has Published 1449 Articles

Bhanu Priya
514 Views
Network security is protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized change to the system.Importance of network securityThe importance of network security is explained below −Confidentiality − Confidentiality is probably the common aspect of information security. We need to protect our ... Read More

Bhanu Priya
3K+ Views
A virtual local area network (virtual LAN) is the logical grouping of network nodes.In other words, a virtual LAN is any broadcast domain that is partitioned and isolated in a network. A VLAN allows several networks to work virtually as one LAN.It gives an advantage to connect multiple devices whether ... Read More

Bhanu Priya
3K+ Views
A default gateway is a node that is present in the computer network that serves as a forwarding host to another network when the destination IP address of a packet does not match with any route.FunctionsThe functions of default gateway are explained below −The major function of the default gateway ... Read More

Bhanu Priya
840 Views
The two address translations that are helpful to make internet routing more efficient are NAT (Network address translation) and PAT (Port address translation).Let us discuss the two translation schemes.Network Address Translation (NAT)NAT is used to convert a private IP address into a public IP address and also a public IP ... Read More

Bhanu Priya
1K+ Views
Let us begin by understanding what network based attacks are.Network based attacksThe different network-based attacks are as follows −SniffingIn this type of network attack, packets of data are captured and monitored by the hacker. These packets flow between server and client. The attacker intercepts the network to read them.This can ... Read More

Bhanu Priya
2K+ Views
The RSA algorithm stands for Rivest-Shamir-Adelman algorithm. RSA algorithm is the most commonly used public key algorithm and this algorithm can be used both for encryption and for signing.RSA uses a variable size encryption block and variable size key. The key pair is derived from a very large number say ... Read More

Bhanu Priya
695 Views
The different ways of security implementations in storage network includes the following −An overall IT and security risk assessment study has been completed including threat probabilities and overall business impacts.This will set a context and basis to develop a credible storage network security plan.Overall IT security objectives and advised spending ... Read More

Bhanu Priya
1K+ Views
Some the issues and solution related to Transmission Control Protocol (TCP) are as follows −Silly window syndrome.Congestion window management.Silly Window SyndromeThis is a problem which arises in TCP flow control. In this the sender window size shrinks to an extremely low value due that the data being sent in each ... Read More

Bhanu Priya
5K+ Views
TCP is a transmission control protocol and a connection-oriented protocol. It provides a flow control and error control facility for information in between the sender and the receiver.A protocol which will be used in the data link layer which will support the reliable and sequential delivery of data frames. This ... Read More

Bhanu Priya
940 Views
Let us begin by understanding the concept of flooding.FloodingFlooding does not require any network information like topology, load condition and cost of different paths.Here, every incoming packet to a node is sent out on every outgoing line except the one it arrived on.In this case all possible routes between Source ... Read More