RC4 is a stream cipher and variable-length key algorithm. This algorithm encrypts one byte at a time (or larger units at a time). A key… Read More
Category Archives: Computer Networks
There are two primary transport layer protocols to communicate between hosts: TCP and UDP. Creating TCP Server/Client was discussed in a previous post. Prerequisite: Creating… Read More
CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a media access control method that was widely used in Early Ethernet technology/LANs when there used to… Read More
Hot Standby Router Protocol (HSRP) is a CISCO proprietary protocol used to provide redundancy in a network. Only one router is the active router while… Read More
Internetworking is combined of 2 words, inter and networking which implies an association between totally different nodes or segments. This connection area unit is established… Read More
Data can be transferred between two computers using Socket programming in C. Similarly, files can easily be sent using UDP protocol and a simple client/server.… Read More
Public Key Cryptography is also known as Asymmetric Cryptography is the type of cryptography which involves the usage of two keys namely Public Key and… Read More
Frames are the units of digital transmission, particularly in computer networks and telecommunications. Frames are comparable to the packets of energy called photons in the… Read More
MANET stands for Mobile Adhoc Network also called a wireless Adhoc network or Adhoc wireless network that usually has a routable networking environment on top… Read More
Content removed on request. Please see Computer Network for more computer network articles. My Personal Notes arrow_drop_up Save
Prerequisite – Access and trunk ports Switches divide broadcast domain through VLAN (Virtual LAN). VLAN is a partitioned broadcast domain from a single broadcast domain.… Read More
Hot Standby Router Protocol (HSRP) is a CISCO proprietary protocol, which provides redundancy for a local subnet. In HSRP, two or more routers gives an… Read More
MAC address also known as physical address is the unique identifier that is assigned to the NIC (Network Interface Card) of the computer. NIC helps… Read More
Prerequisite : RSA Algorithm Why RSA decryption is slow ? RSA decryption is slower than encryption because while doing decryption, private key parameter ” d… Read More
Prerequisite – How ARP works, Packet flow in the same network To deliver the packet to the destination host, the source IP, destination IP, source… Read More