Articles for category: Computer Network

Trapti Gupta

Proxy Servers and Web Caching

The proxy server is the gateway that acts as an intermediary server between the user and the internet and entry of cyber attackers is prevented by it.Web caching reduces the workload of the server by serving some of the requests of the web browser with the help of data stored in the cache. Scope What ...

Trapti Gupta

Types of DNS Attacks and Tactics for Security

DNS (Domain Name Server) translates the domain name into an IP address. DNS attacks target the Domain Name Server and its infrastructure. The most common types of DNS attacks are NXDOMAIN attacks, DNS spoofing, DNS amplification, etc. Scope What Is a Domain Name Server (DNS) Attack? Domain Name System is abbreviated as DNS and it ...

Neha Kumari

Wireless Mobile Communication

Wireless Mobile Communication is one of the rapidly expanding and high-tech domains in the mobile communication field. Wireless Communication is a technique of transferring pieces of information from 1 point of communication to another, disregarding exploitation of any wireless connection such as cables, wires, or any physical medium. Overall, in a very wireless communication organization, ...

Trapti Gupta

What is Network Simulator?

Network simulators and network emulators are used in the research work of the computer network. A network simulator is a tool or software program that allows for analyzing the relationships between different components connected in the network. What is a Network Simulation? Network Simulator Network simulation is one of the methods used in computer network ...

Akshay Mishra

Network Layer Design Issues

Network layer design involves key challenges: routing, addressing, and forwarding. Routing protocols determine paths for data packets, balancing efficiency and reliability. Addressing assigns unique identifiers to devices. Forwarding directs packets based on addresses. Quality of Service (QoS) ensures performance levels. Security must safeguard data. Scalability addresses growth. Interoperability supports different technologies. Congestion control manages data ...

Sushant Gaurav

MIME in Computer Networks

MIME in computer networks stands for Multipurpose Internet Mail Extensions. MIME is an extension of its parent protocol i.e. SMTP (Simple Mail Transfer Protocol). MIME protocol is not restricted to textual data only. With the help of the MIME protocol, we can send various types of data through the internet such as text, images, audio, ...

Trapti Gupta

Packet Flow in Different Network

For sending the packet to its destination we must be aware of the source MAC address and destination MAC address and source and destination IP address. The packet will be directly delivered if the destination is available in the same network otherwise the packet is sent to the default gateway first. Introduction For the successful ...

Akshay Mishra

Multiplexing TCP and UDP Socket

All protocol architectures that have ever been created offer multiplexing and demultiplexing features. The source port number field and the destination port number field are two unique fields that UDP and TCP use to conduct the demultiplexing and multiplexing tasks in the segment headers.Multiplexing is the act of assembling data from several application processes of ...

Prithvi Raj Kumar

DHCP Relay Agent

Computers or devices require IP addresses to communicate on the network. In today’s world, there are numerous network types available, including the internet, intranet, local area network, wide area network, storage area network, and so on. To communicate on those networks, each device requires an IP address. We can manually or automatically assign an IP ...

Priyanshu Pandey

Noisy and Noiseless Channels

Data link layer protocols are classified according to whether the transmission channel is noiseless or noisy. Noiseless is an ideal or perfect channel where no frames are lost, duplicated, or corrupted. In contrast, a noisy channel indicates that there will be a lot of disruption in the path when data is transmitted from the sender ...