Articles for author: Neha Kumari

Neha Kumari

Router on a Stick

Router-on-a-stick (ROAS) could be an approach to link a router with one individual physical link to handle and execute IP routing among VLANs. Through the switch’s outlook, A physical link is drawn as a trunk port permitting all VLANs that proceed to be routed. Coming from the router’s viewpoint, another physical intersection is constituted as numerous effective sub-alliances, ...

Neha Kumari

What is Traceroute?

Traceroute is the most preferred tool that network engineers make use of to troubleshoot networks. It was innovated in 1987 and remains extremely relevant these days. Traceroute may be a widely handed-down command-line benefit accessible in nearly all operating systems. It manifests you the entire route to a goal address. It also manifests the time ...

Neha Kumari

Multiple Access Protocols

Whenever a sender and receiver have a radical link to transmit data/information packets, the data link management is enough to handle the channel. Assume there is no committed path to communicate the data between 2 devices. In this case, with multiple access protocols, the channel at the same time transmits the information over the channel. ...

Neha Kumari

Framing in Data Link Layer

Framing in the data link layer is a vital side wherever a difficulty is often highlighted to form a sense of the events. It will regulate the audience’s perception and additionally the acceptance of a specific meaning. As media plays a specific role in people’s perceptions, negative framing can produce a huge impact on individuals. ...

Neha Kumari

Routing Algorithms in Computer Networks

Routing algorithms in computer networks could be a procedure that lays down the route or path to transfer information packets from the supply to the destination. They assist in directing web traffic with efficiency. Once an information packet leaves its store, it will select among the numerous methods to reach its destination. The routing formula ...

Neha Kumari

TACACS+

Terminal Access Controller Access-Control System (TACACS) refers to a family of connected protocols handling remote authentication and connected services for network access management through a centralized server. The initial TACACS protocol, which dates back to 1984, was utilized for communicating with an authentication server, common in older UNIX networks or other operating systems as well ...

Neha Kumari

Access Lists in Computer Networks

Explanation of an Access List. Access control lists (ACLs) execute message clarifying to regulate the movement of messages across a network. A message is describing supplies security by restricting traffic into a connection, limiting user and device approach to a network, and restraining traffic from going away from a network. Introduction Access-list (ACL) could be ...

Neha Kumari

DNS Spoofing | DNS Cache Poisoning

Domain Name System poisoning and spoofing are kinds of cyberattacks that use DNS server susceptibility to redirect traffic aside from permissible servers on the way to fraud. When you’ve proceeded to a defrauding page, you may be at a loss on how to resolve it — even with being the exclusive one who can. You’ll ...

Neha Kumari

Wireless Mobile Communication

Wireless Mobile Communication is one of the rapidly expanding and high-tech domains in the mobile communication field. Wireless Communication is a technique of transferring pieces of information from 1 point of communication to another, disregarding exploitation of any wireless connection such as cables, wires, or any physical medium. Overall, in a very wireless communication organization, ...

Neha Kumari

Hot Spot 2.0

Hotspot 2.0 (HS2), also known as Passpoint” or “Next Generation Hotspot, represents a significant evolution in public Wi-Fi access. This innovative standard, driven by the Wi-Fi Alliance and endorsed by the Wireless Broadband Alliance, simplifies and secures the process of connecting to public wireless hotspots. It’s built on the IEEE 802.11u standard, enhancing how devices discover and securely connect to network ...