Computer Network

1602
Computer Networks and the Internet
Computer Networks and the Internet

Today’s Internet is perhaps the largest engineered system ever created by mankind, with hundred of millions of connected computers, communication links, and switches; hundreds of millions of users who connect from time to time via cell phones and PDAs; and devices such

Tags computer network, protocol layering, network application
1000
Network Protocols
Network Protocols

A network protocol is like a human protocol, except that the entities exchanging messages and taking actions are hardware or software elements of some device (for instance, computer, PDA, cell phone, router, or other network-capable device). All activity in the Internet that

Tags network protocol, routers, computer network
1120
The bad guys can put malware into your host via the Internet
The bad guys can put malware into your host via the Internet

We connect devices to the Internet because we want to receive/send data from/to the Internet. This contains all kinds of good stuff, including Web pages, e-mail messages, MP3s, telephone calls, live video, search engine results, and so on. But, unluckily, along with all that good stuff

Tags network application, host, computer network
1321
The bad guys can attack servers and network infrastructure
The bad guys can attack servers and network infrastructure

A large class of security threats can be classified as denial-of-service (DoS) attacks. As the name suggests, a DoS attack renders a network, host, or other piece of infrastructure unusable by legitimate users. Web servers, e-mail servers, DNS servers (discussed in "Application

Tags computer network, packets, server
968
A Proliferation of Networks: 1980 - 1990
A Proliferation of Networks: 1980 - 1990

By the end of' the 1970s, about two hundred hosts were connected to the ARPAnet. By the end of the 1980s the number af hosts connected to the public Internet, a confederation of networks looking much like today's Internet, would reach a hundred thousand. The 1980s would be

Tags minitel system, host, computer network
2226
Processes Communicating
Processes Communicating

Before building your network application, you also need a basic understanding of how the programs, running in various end systems, communicate with each other. In the terminology of operating systems, it is not in fact programs but processes that communicate. A process

Tags network application, end systems, computer network, application layer
715
A Brief Foray into IP Security
A Brief Foray into IP Security

"Internet Control Message Protocol (ICMP)" covered IPv4 in some detail, containing the services it provides and how those services are implemented. While reading through that section, you may have noticed that there was no mention of any security services. In fact, IPv4 was

Tags computer network, virtual private networks, routers, hosts, cryptographic algorithms
Page 0 of 1 « Previous 1 Next »

Copy Right

The contents available on this website are copyrighted by TechPlus unless otherwise indicated. All rights are reserved by TechPlus, and content may not be reproduced, published, or transferred in any form or by any means, except with the prior written permission of TechPlus.