Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Pranavnath
Page 12 of 39
Trusted Systems in Network Security
A Trusted System is a computer system that provides users with assurance that no malicious or harmful software can compromise system security. In network security, trusted systems implement multi-layered security (MLS) approaches to protect data and infrastructure from cyberattacks, malware, and unauthorized access. With organizations increasingly adopting cloud storage, wireless networks, and remote applications, the challenges of protecting network resources have grown significantly. Trusted systems address these challenges by enforcing strict security policies that cannot be altered by applications or unauthorized users. Network Security and Multilayered Defense Network Security encompasses the protection of data, network infrastructure, and ...
Read MoreAddress Resolution in DNS (Domain Name System)
DNS (Domain Name System) is an essential component of the internet infrastructure that translates human-readable domain names into computer-readable IP addresses. When you type a website address in your web browser, DNS translates it into an IP address such as 126.32.0.36, which computers use for identification and communication. The process of converting domain names into IP addresses is called address resolution. Address resolution plays a critical role in the functioning of the Internet as it enables users to access websites using easy-to-remember domain names instead of complex IP addresses. DNS Address Resolution Process ...
Read MoreTraditional TCP
Traditional TCP (Transmission Control Protocol) is a connection-oriented, reliable transport layer protocol that ensures data delivery between communicating devices over wired networks. Operating at Layer 4 of the OSI model, TCP provides complete transport services by breaking data into segments, managing their transmission, and reassembling them at the destination. TCP was originally designed by Vint Cerf and Bob Kahn for reliable communication over stable wired networks. It works in conjunction with the Internet Protocol (IP) to form the TCP/IP protocol suite, which serves as the foundation of modern internet communication. Traditional TCP Data Flow ...
Read MoreAdvantages and Disadvantages of Ethernet
Ethernet is a wired networking technology that connects computers and devices within Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs). It uses physical cables, network adapters, and standardized protocols to enable reliable data communication between devices. Ethernet is widely deployed in organizations, educational institutions, hospitals, and office environments where stable, high-speed connectivity is essential for daily operations. Ethernet Network Components Computer Network Adapter Switch Hub/Router ...
Read MoreUnderstanding Web Authentication behind the login screen
Web Authentication is the process of verifying user credentials when accessing online accounts like e-commerce websites, social media platforms, or online banking services. Each user account is assigned a unique identifier and password, which are securely stored on web servers for future verification. Modern authentication also supports biometric methods like fingerprint scanning, facial recognition, and voice authentication. Consider Gmail as an example − during login, users must enter their username/email and password. Only when this combination matches the mail server database records will access be granted to the account and its services. Web Authentication ...
Read MoreBasic Frame Structure of HDLC
HDLC stands for High-level Data Link Control which is a collection of protocols that ensures communication purposes among nodes or network points. It was developed by the International Organization for Standardization (ISO). The data to be transmitted is organized in the form of frames which when transferred to the destination is acknowledged for its appropriate arrival. It can be applied to both point-to-point connections and multipoint connections as it is a bit-oriented protocol. The system of Automatic Repeat Request is implemented via HDLC and also full-duplex communications could be done with the help of HDLC. Due to its high ...
Read MoreTypes of Network Protocols and Their Uses
Network protocols are standardized sets of rules that govern how devices communicate and exchange data across networks. These protocols enable seamless communication between different devices, regardless of their hardware, operating system, or network architecture, making modern digital communication possible across local networks and the Internet. Network protocols serve three primary functions: enabling network communication, managing network operations, and ensuring network security. Each protocol is designed to address specific networking requirements and operates at different layers of the OSI model. Types of Network Protocols Network protocols are categorized into three main types based on their primary functions: ...
Read MoreBluetooth Modes
Bluetooth is a short-range wireless communication technology that operates in the 2.4 GHz ISM band. It enables devices to connect and share data within a range of approximately 10 meters without requiring cables or internet connectivity. Bluetooth uses frequency hopping spread spectrum (FHSS) to divide data into packets and transmit them across different frequency channels, providing secure and interference-resistant communication. Before data transmission can occur, Bluetooth devices must be paired through an authentication process, ensuring secure connections between authorized devices. Bluetooth Network Architecture Master Device ...
Read MoreVideo Conferencing Protocols
Video conferencing protocols are standardized communication rules that enable real-time audio and video communication over networks. These protocols define how multimedia data is transmitted, synchronized, and managed between participants in video conferences across different devices and network types. Video conferencing systems rely on these protocols to establish connections, negotiate capabilities, compress media streams, and ensure quality communication. Understanding these protocols is essential for network administrators and developers working with multimedia communication systems. Network Types for Video Conferencing Video conferencing operates over two fundamental network architectures: Circuit-Switched Networks − Establish a dedicated communication path between ...
Read More50 Common Ports You Should Know
In computer networking, ports serve as logical channels that enable communication between devices and applications. Each port is identified by a unique port number ranging from 0 to 65535, assigned by the Internet Assigned Numbers Authority (IANA). Understanding these port numbers and their associated services is essential for network administrators, IT professionals, and cybersecurity specialists. This article explores 50 of the most commonly used ports in networking, organized by their categories and significance. These ports facilitate everything from web browsing and email to database connections and remote access. Port Number Categories Port numbers are divided into three ...
Read More