Skip to content

Category Archives: Computer Networks

The computer network is a system in which multiple computers are connected to each other to share information and resources. They share resources from one computer… Read More
HSRP, VRRP, and GLBP all are First Hop Redundancy Protocols and network-layer protocols which are used to provide redundancy in the network. The main purpose… Read More
Cyber Security is the branch of computer technology that deals with the security of the virtual cloud and internet. Any information that is stored or… Read More
Many cyber-attacks take place by exploiting the weaknesses in the network. ARP poisoning is also one such cyber-attack. It exploits the Address Resolution Protocol (ARP)… Read More
The implementation of SDN varies very much from the conventional network. In traditional networking, the data packet forwarding and routing happen in the same device.… Read More
In the early 80s PCs became more popular and easily accessible to the general population, this also led to the increased use of computers in… Read More
In the seven-layer OSI model, the hubs are broadcast devices that operate on layer-1 in half-duplex mode, so only one device can transfer data at… Read More
TCP users communicate with each other by sending packets. The packet contains data and other information about the source and destination and other TCP variables.… Read More
Congestion occurs when packets’ arriving rate is faster than packets forwarding speed. The router has input and output ports. Thus congestion can happen at any… Read More
A Firewall is hardware or software to prevent a private computer or a network of computers from, it acts as a filter to avoid unauthorized… Read More
Cyber Security is the branch of technology that deals with the security of using the internet. Technology is an essential part of today’s generation, it… Read More
X.509 is a digital certificate that is built on top of a widely trusted standard known as ITU or International Telecommunication Union X.509 standard, in… Read More
Electronic signature or e-sign is the modern technology method of signing the documents or say any data/content by putting the signature through the digital device.… Read More
All IP datagrams must have the standard 20-byte header, which contains key information such as the source and destination address of the datagram, fragmentation control… Read More
IPsec might be a gaggle of protocols that square measure used along to line up encrypted connections between devices. It helps keep knowledge sent over… Read More

Start Your Coding Journey Now!