Articles for category: Computer Network

Priyanshu Pandey

Difference between Internet and WWW

Some people use the words “internet” and “World Wide Web” interchangeably. They believe they are the same, although this is not the case. The difference between the Internet and WWW (World Wide Web ) is essential to understand. WWW or web is one of the key services offered by the internet. The World Wide Web, ...

Aditya Saxena

Onion Routing

Onion routing is a method of communicating anonymously over a network. A data message is contained within several layers of encryption, in an onion network. This data is transferred via a sequence of network nodes known as onion routers—the onion routers "peel" away one layer, revealing the next destination of the data. Once the decryption ...

Trapti Gupta

Proxy Servers and Web Caching

The proxy server is the gateway that acts as an intermediary server between the user and the internet and entry of cyber attackers is prevented by it.Web caching reduces the workload of the server by serving some of the requests of the web browser with the help of data stored in the cache. Scope What ...

Trapti Gupta

Types of DNS Attacks and Tactics for Security

DNS (Domain Name Server) translates the domain name into an IP address. DNS attacks target the Domain Name Server and its infrastructure. The most common types of DNS attacks are NXDOMAIN attacks, DNS spoofing, DNS amplification, etc. Scope What Is a Domain Name Server (DNS) Attack? Domain Name System is abbreviated as DNS and it ...

Neha Kumari

Wireless Mobile Communication

Wireless Mobile Communication is one of the rapidly expanding and high-tech domains in the mobile communication field. Wireless Communication is a technique of transferring pieces of information from 1 point of communication to another, disregarding exploitation of any wireless connection such as cables, wires, or any physical medium. Overall, in a very wireless communication organization, ...

Akshay Mishra

Multiplexing TCP and UDP Socket

All protocol architectures that have ever been created offer multiplexing and demultiplexing features. The source port number field and the destination port number field are two unique fields that UDP and TCP use to conduct the demultiplexing and multiplexing tasks in the segment headers.Multiplexing is the act of assembling data from several application processes of ...

Prithvi Raj Kumar

DHCP Relay Agent

Computers or devices require IP addresses to communicate on the network. In today’s world, there are numerous network types available, including the internet, intranet, local area network, wide area network, storage area network, and so on. To communicate on those networks, each device requires an IP address. We can manually or automatically assign an IP ...

Priyanshu Pandey

Noisy and Noiseless Channels

Data link layer protocols are classified according to whether the transmission channel is noiseless or noisy. Noiseless is an ideal or perfect channel where no frames are lost, duplicated, or corrupted. In contrast, a noisy channel indicates that there will be a lot of disruption in the path when data is transmitted from the sender ...

Shivam Verma

Wireless Sensor Network

A Wireless Sensor Network (WSN) is a network of small, autonomous devices equipped with sensors that monitor and collect data from their surroundings. They communicate wirelessly, enabling data collection, analysis, and transmission. WSNs are used in a variety of fields, including environmental monitoring, industrial automation, healthcare, and smart infrastructure. What are Wireless Sensor Networks (WSNs)? ...

Priyanshu Pandey

Types of VPN and Its Protocols

A VPN (virtual private network) is a service that establishes a secure, encrypted online connection. A VPN establishes a virtual connection between your device and a distant server managed by a VPN service. This connection establishes a secure point-to-point tunnel that encodes your personal information, conceals your IP address, and enables you to bypass online ...