Monday, October 22, 2018

Protection Against Network Threats

Protection Against Network Threats - If Confidential Or Accuracy Of Information Is Of Any Value At All It Should Be Protected To An Appropriate Level. If The Unauthorised Disclosure Or Alteration Of The Information Could Result In Any Negative Impact, It Should Be Secured. However, The Means To Achieve The Requisite Protection

Read More

Network Security

It Is Very Important To Have Security To Your Computer Network. Network Security Is Nothing But Giving Security For The Network To Avoid Unauthorised Access. Absolute Security (Total Security) If You Unplug Your Computer From The Network Or If You Switch Off The Power Supply Or If You Lock You're And Put's

Read More

Types And Sources Of Network Threats

Denail OF Service(DoS), Unauthorised Access, Executing Commands Illicitly, Confidential Breaches, Destructive Behavior Are The Types And Sources Of Network Threats.   Denial Of Service(Dos) It Is A Cyber Attack On A Specific Server Or A Network With The Intended Purpose Of Disrupting Normal Operation. DoS Attack Floods The Target With Constant Flood Of

Read More

HUBS,Switches,Gateways,Routers,Bridges : Network Works

Network Works Using HUB, SWITCH, ROUTER. All These Three Devices Are Similar But There Is A Difference In The Way They Handle Data. So Lets Understand About These Three. HUB The Purpose Of A Hub Is To Connect All Of Your Network Devices Together On A Internal Network. It Is A Device

Read More

Application Layer Protocols

Application Layer Protocols Are Classified Into 1) Common Application Specific Elements(CASE) 2) Specific Applications Specific Elements(SASE), Application Layer Is The Top Most Layer Of OSI Model With Which User Can Interact Directly. Application Layer Provides Services To The User. Common Application Specific Elements And Specific Application Specific Elements Are Commonly Required

Read More

Internet Protocol IP Addressing And Subnetting

IP Addressing And Subnetting - You Need IP Address For Your Computer To Communicate With Another Computer With IP Address, In Simple Words, Every Computer Should Have IP Address, So That Computers Can Interconnect To Send And Receive Data. But What Is IP Addressing? IP Address Is 32 Bit. Which Consists Of Four

Read More

Internet Protocol

Internet Protocol Address Is Given For Every Computer To Identify It In The Network. You Have Your Name For Your Body Similarly Computer Have Internet Protocol Address. To Transfer Data To A Computer From Your Computer, You Have To The IP Address Of That Computer. Every Computer Has A Unique IP Address. To Connect

Read More

Socket – Unix Socket Programming

Socket Programming Used To Build Any Network ApplicationNetwork Application Use A Client-Server Architecture, Where The Client And Server Are Two Computers, Connected To The Network. The Server Is Programmed To Provide Some Service To The Client. The Client Is Typically A Desktop, Laptop Or Portable Device Like Apple iPhone. Why Socket Programming? To

Read More

Socket – Client Server Architecture

Example For Socket Is ElectricSocket In Which We Put Plug, The Electric Socket Have Two Ends Connected To It. One Ends With Electricity Inside It And One End With Plug, Which We Put Outside. There Are Two Ends Connected To A Socket. In Computer Network, NetworkSocket Contains Ip Address And Port Number. See The

Read More

3 Way Handshake – TCP Connection Establishment And Connection Termination – Transport Layer – Computer Networks

3 Way Handshake, There Are Three Activities Happens Between One Client And Server Before And After Sending Data.TCP Is Majorly Used Protocol, Whenever We Need Reliability Whenever We Need Guarantee To Reach The Packet We Have To Use TCP. We Use 3 Way Handshake Of TCP In The Time Of Communication Between Client Machine

Read More