Found 1175 Questions for Computer Network

What are the differences between Physical and Logical Topology?

Bhanu Priya
Updated on 24-Mar-2022 08:16:11
The network topology is a structure or the physical arrangement of the network devices, how the components of the network are interconnected with each other.Types of network topology are as followsBusStarRingMeshHybridLogical TopologyIt tells about a network that should be configured for the transfer of information. This is different from physical topology as it does not explain the physical wiring of a network, but instead, it describes the flow of data, information, and back, from one system to another and the routes it takes.Some examples of Logical topology are as follows −Logical Star Topology − Uses logical bus topology to transfer ... Read More

What is Campus Area Network (CAN)?

Bhanu Priya
Updated on 22-Mar-2022 12:28:17
Campus Area Network (CAN) is also called a corporate area network and it helps to like LAN with small geographical space. The main objective is offering the best accessibility of campus residential regions like schools, colleges, university, small institutes (Campus), and corporate area (building). It is larger than LAN but small than WAN and MAN networksIt can cover many buildings in an area. Here all computers are connected together and have some relationship to each other.For example − Different buildings in a campus are connected using Campus Area Network (CAN) they help to interconnect departments, library and computer laboratories.Given below ... Read More

Differentiate between Data Privacy and Data Security.

Bhanu Priya
Updated on 21-Mar-2022 13:21:09
Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ... Read More

Distinguish between Data Privacy and Data Protection.

Bhanu Priya
Updated on 21-Mar-2022 13:18:42
To begin with, let us learn the concepts of data protection and data privacy.Data ProtectionData protection is inclusive of the strategies that we can use to secure the privacy, availability, and integrity of our data. It is also called data security or information privacy.Data protection is important for any organization which collects, handles, or stores sensitive data. This strategy can help prevent data loss, theft, or corruption and can help minimize damage caused by disaster.Data PrivacyData privacy is defined as only the authorised person can access the data. It is typically applied to personal health information (PHI), personally identifiable information ... Read More

What is ISCII Encoding?

Bhanu Priya
Updated on 17-Mar-2022 10:43:45
The full form of ISCII is Indian Script Code for Information Interchange. It was established as Bureau of Indian Standards in 1991 and it is based on an earlier Indian Standard IS 10401:1982. It is a type of coding scheme for Indian languages.It is an 8-bit standard where lower 128 characters (0-127) conform to ASCII standard and higher 128 characters (128-255) are used to encode characters from an Indian script.ISCII encoding strategy is used in Unicode in their encoding. Generally the characters of the Indian language derive from the ancient Brahmi script. Mostly all the characters resemble closely to each ... Read More

What are the Service Primitives in Computer Network?

Bhanu Priya
Updated on 17-Mar-2022 07:56:26
A service is a set of primitives or we call it as operations where a user can invoke to access the service.The selective primitives tell the service to perform an action taken by peer nodes.The initiating node wants to establish a connection send CONNECT.Request − A node wants to do some work or a packet is being sent.The receiver accepts the request and CONNECT.Indication − A node is saying that it wants to set up a connection to it.The CONNECT. The node issuing the initial CONNECT. request finds out what happened via a CONNECT. Confirm primitive.Response is primitive to tell ... Read More

What are the challenges of a Computer Network?

Bhanu Priya
Updated on 17-Mar-2022 06:58:44
Let's try to understand what reliability challenges for computer networks are.This can be defined as packet loss, bandwidth saturation, and latency, but this type of information would be really unhelpful to those IT companies whose networks are small, and failures not well under- stood & might be limited to rebooting.Five reliability challengesThe reliability challenges for a computer network are as follows −Host IdentificationThe Host ID is the portion of an IP address that uniquely identifies a host on a given TCP/IP network.The smaller networks can be easily configured with the help of manual addressing, but it becomes a serious problem ... Read More

What is Real-time Communication in LAN?

Bhanu Priya
Updated on 17-Mar-2022 06:35:35
A real-time system means the system is subjected to real-time that means the response should be guaranteed within a specified timing constraint or system should meet the specified deadline.For example − Flight control system, real-time monitors etc.Features of Real-time SystemThe features of real-time system are as follows −Reliability − The system can operate for a long time without any interfere of the humanManageability − In a real-time system the cost of implementation is to be reduced.Performance − The system should be designed for the purpose of working easier and the workload should be reduced.Predictability − Within the given time, the actions ... Read More

Internet Control Message Protocol (ICMP)

Urmila Samariya
Updated on 23-Nov-2021 12:03:47
Internet Control Message Protocol (ICMP) works in the network layer of the OSI model and the internet layer of the TCP/IP model. It is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices send a message using ICMP. Messages that can be sent include "destination unreachable", "time exceeded", and "echo requests".ICMP is a network layer protocol.ICMP messages are not passed directly to the data link layer. The message is first encapsulated inside the IP datagram before going to the lower layer.Types of ... Read More

Types of Firewalls in Computer Networks

Urmila Samariya
Updated on 23-Nov-2021 12:01:36
A firewall is a network security device; it is a protective layer for the server that monitors and filters all the incoming and outgoing network traffic. It uses a set of rules to determine whether to allow or block a specific network traffic. Firewalls can prevent unauthorized use before reaching the servers. Firewalls can be hardware or software-based.Firewall PoliciesTo protect private networks and individual machines, a firewall can be employed to filter incoming or outgoing traffic based on a predefined set of rules known as firewall policies.Packet flowing through a firewall can have one of the following three outcomes −Accepted ... Read More
Advertisements