Skip to content

Category Archives: Computer Networks

Dynamic Host Configuration Protocol(DHCP) uses the DORA. Dynamic Host Configuration Protocol is the protocol of the application layer. It is used to provide Subnet Mask,… Read More
Access control is a security mechanism to put restrictions on the accessibilities of the resources and decide who or what can view or use the… Read More
The Threat, Vulnerability, and Risk these terms are interrelated but not the same. In this article, we are going to discuss the difference between them… Read More
Internet of Things or IoT is one of the most prominent innovations in recent times that has enhanced industrial automation. Due to sensor-based advancements and… Read More
A distributed system is a set of computers joined by some sort of communication network, each of which has its database system and users may… Read More
Routing is a procedure of making decisions in which the router (which is a hardware device used in networking to receive and send data in… Read More
A shell is a program that interprets our commands and gives the written commands to the operating system. It acts as an interface between the… Read More
Prerequisite – File Transfer Protocol An FTP Bounce attack is an old type of network attack that is performed on FTP servers to send outbound… Read More
Wireshark is software that is widely used in the analysis of data packets in a network. Wireshark is completely free and open source. This packet… Read More
Digital Enhanced Cordless Telecommunications(DECT) is one of the applications of computer networks that comes under wireless networks widely used for both domestic and business purposes.… Read More
The Session and Token-based Authentication methods are used to make a server trust any request sent by an authenticated user over the internet. In this… Read More
Bit Stuffing is a process of inserting an extra bit as 0, once the frame sequence encountered 5 consecutive 1’s. Given an array, arr[] of… Read More
The full form of MOM is Message-Oriented Middleware which is an infrastructure that allows communication and exchanges the data (messages). It involves the passing of… Read More
In computer networks, an IP address is a unique address that identifies a device on the internet or a local network. Using IP address we… Read More
Delay distortion is basically a process where the frequency and velocity of signal wave can transmit only at a certain range of bandwidth in a… Read More

Start Your Coding Journey Now!