Skip to content

Category Archives: Computer Networks

Spoofing is a completely new beast created by merging age-old deception strategies with modern technology. Spoofing is a sort of fraud in which someone or… Read More
TCP is one of the important protocols of the network protocol suite. TCP is a connection-oriented and reliable data transmission protocol. TCP uses MTU (Maximum… Read More
Frame Relay sends information in packages called frames via a shared Frame Relay network. Each frame contains all the information needed to move it to… Read More
AIMD is a feedback control algorithm, it is used by TCP protocols in the transport layer of the TCP/IP stack. The AI phase is responsible… Read More
Ransomware is a type of malware that denies access to data files using encryption until a ransom is paid. It comes under the category of… Read More
Routing protocols specify how routers talk to each other to exchange information about routes within the same system. This communication happens by sending all or… Read More
Every computer on the network has to have an IP address for communication purposes. An IP address is an identifier for a computer or device… Read More
Given the initial congestion window size cwnd, threshold value ssthresh, connection time rtt and an array arr where arr[i] implies the time when a packet… Read More
FTP stands for file transfer protocol and it is an application layer protocol for transferring files between a client and a server. We can download,… Read More
Mobile forensics, a subtype of digital forensics, is concerned with retrieving data from an electronic source. The recovery of evidence from mobile devices such as… Read More
Internet became something without which our lives are incomplete. Every day each internet user makes 100s of queries on the internet, be it a simple… Read More
Data is prone to various attacks. One of these attacks includes message authentication. This threat arises when the user does not have any information about… Read More
Authentication is the process of proving one’s identification to a person else. As people, we authenticate every other in lots of approaches like we recognize… Read More
Rate Halving is the packet loss recovery algorithm that overcomes the issue of the Fast Recovery algorithm. Rate Halving means that it will half the… Read More
In this article, we will look at how we can analyze the ordering of events in a distributed system. As we know a distributed system… Read More

Start Your Coding Journey Now!