Skip to main content

Posts

Showing posts from September, 2017

MD5

MD5:- The MD5  hashing   algorithm  is a one-way cryptography  function  that accepts a message of any length as input and returns as output a fixed-length   digest  value to be used for  authenticating  the original message. The MD5 hash function was originally designed for use as a secure  cryptography  hash algorithm for authenticating  digital signatures . MD5 has been deprecated for uses other than as a non-cryptographic  checksum  to verify data integrity and detect  unintentional l  data corruption . Although originally designed as a  cryptography   message authentication code  algorithm for use on the internet, MD5 hashing is no longer considered reliable for use as a cryptographic checksum  because researchers have demonstrated techniques capable of easily generating MD5  collisions  on commercial off-the-shelf computers. Ronald  Rivets , founder of RSA Data Security and institute professor at MIT, designed MD5 as an improvement to a prior message digest

connection oriented

connection-oriented:- connection-oriented  describes a means of transmitting data in which the devices at the end points use a preliminary  protocol  to establish an end-to-end connection before any data is sent. Connection-oriented protocol service is sometimes called a "reliable" network service, because it guarantees that data will arrive in the proper sequence. Transmission Control Protocol ( TCP ) is a connection-oriented protocol. For connection-oriented communications, each end point must be able to transmit so that it can communicate. The alternative to connection-oriented transmission is the  connection-less  approach, in which data is sent from one end point to another without prior arrangement. Connection-less protocols are usually described as  stateless  because the end points have no protocol-defined way to remember where they are in a "conversation" of message exchanges. Because they can keep track of a conversation, connection-oriented protoco

CHECKSUM,UDP

Check-sum Definition: A checksum is a count of the number of bits in a transmission unit that is included with the unit so that the receiver can check to see whether the same number of bits arrived. If the counts match, it's assumed that the complete transmission was received. Both  TCP  and  UDP  communication layers provide a checksum count and verification as one of their services. It is provide some key that is include with data bits,and when the receiver will receive the massage then the check the massage and checksum bit ,if it not modify then data will be safe. UDP (User Datagram Protocol):- UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol ( TCP ) used primarily for establishing low-latency and loss tolerating connections between applications on the Internet. Both UDP and TCP run on top of the Internet Protocol (IP) and are sometimes referred to as UDP/IP or TCP/IP. Both protocols send short packets of data,

HTTP/HTTPS

http:- HTTP stands for  Hypertext Transfer Protocol . When you enter  HTTP://  in your address bar in front of the domain, it tells the browser to connect over HTTP. HTTP uses TCP (Transmission Control Protocol), generally over port 80, to send and receive data packets over the web. To put it simply it is a protocol that’s used by a client and server which allows you to communicate with other websites. The client sends a request message to a HTTP server (after the TCP handshake) which hosts a website, the server then replies with the response message. The response message contains completion status information, such as “HTTP/1.1 200 OK”. https:- HTTPS stands for  Hypertext Transfer Protocol Secure  (also referred to as HTTP over TLS or HTTP over SSL). When you enter  HTTPS://  in your address bar in front of the domain, it tells the browser to connect over HTTPS. Generally sites running over HTTPS will have a redirect in place so even if you type in  HTTP://  it will redirect t

TCP/IP protocol

TCP (Transmission Control Protocol):- TCP (Transmission Control  Protocol ) is a standard that defines how to establish and maintain a network conversation via which  application programs  can exchange data. TCP works with the Internet Protocol ( IP ), which defines how computers send  packet s of  data  to each other. Together, TCP and IP are the basic rules defining the Internet. TCP is defined by the Internet Engineering Task Force ( IETF ) in the Request for Comment ( RFC ) standards document number 793. TCP is a connection-oriented protocol, which means a connection is established and maintained until the application programs at each end have finished exchanging messages. It determines how to break application data into packets that  networks  can deliver, sends packets to and accepts packets from the network layer, manages  flow contro l ,  and—because it is meant to provide error-free data transmission—handles re-transmission of dropped or garbled packets as well as ack

internet protocol

internet protocol is layer 3 protocol which act as glue to hold the whole internet together. ti is used to across the internet home network and business network. it provide data-gram or connection-less  services between the end services.internet protocol is frenetically use together transmission control protocol and allow to both conversely  tcp/ip . connection less feature is made extremely good for packet deliver (not guaranteed ). An IP address (short for Internet Protocol address) is used to identify computers on the Internet. It works like a return address would on a piece of mail. How IP addresses work:- When your computer or device sends a request, like a search on Google, it tags the request with your IP address. That way Google knows where to send the response

flow control

Transport layer deal with the flow control of data and this is performed end to end rather than across a single network .Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be re-transmitted. For serial data transmission locally or in a network, the Xon/Xoff protocol can be used. For modem connections, either Xon/Xoff or CTS/RTS (Clear to Send/Ready to Send) commands can be used to control data flow. In a network, flow control can also be applied by refusing additional device connections until the flow of traffic has subsided.it  is solve this problem than it's use concept of buffer. application program:- An application program  is any  program  designed to perform a specific function directly for the user or, in some cases, for another application prog

operating system

An operating system is a program that acts as an interface between the user and the computer hardware and controls the execution of all kinds of programs. An operating system performs these services for applications: In a multitasking operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn. It manages the sharing of internal memory among multiple applications. It handles input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. It sends messages to each application or interactive user (or to a system operator) about the status of operation and any errors that may have occurred. It can offload the management of what are called  batch  jobs (for example, printing) so that the initiating application is freed from this work. On computers that

Wireless Technology

Wireless Technology:-- we all are familiar with the terms WIFI ,BLUTOOTH ,ZIGBEE ,3G/4G ,Satellite services. whether is on account of you having made a call utilizing a cell phone ,got a massage on your pager, checked your email from a PDA or even just seen an advert identified with it. Wireless technology allows transmission of information over a distance without using cable ,wire or other forms of electrical conductors, i.e.,if a user ,application or company wishes to make data portable ,mobile and accessible then wireless networking is the answer. Wireless access to the network become more popular in public place like library,hotel ,cafeteria guesthouse and school and collage. It is three type :- Short-range wireless communication medium range wireless communication  Wide range wireless communication 

network and its type

Network:- network is a group of people who exchange the information contact and experience for professional and social purpose ,therefore networking is define as one's effort and create this group.  Types Of Network: computer network are classifieds into different type depending on their size and  usage. network size is determine by the   number of computer that it holds and by the area that is the geographic area that it occupied. network can include any number of device from those within room to those which are distributed across the world .the following are the types of network: LOCAL AREA NETWORK(LAN) WIDE AREA NETWORK (WAN) METROPOLITAN AREA NETWORK(MAN) PERSONAL AREA NETWORK(PAN) PAN:- A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth e

cryptography

cryptography Cryptography is an art of converting the original text in an unknown format in such a way that the message sent from source to destination is secured. The process of cryptology involves converting an actual message into an encrypted format using a secret key, which is shared between the source and destination. Strong cryptography is secreted and encrypted communication that is well-protected against cryptographic analysis and decryption to ensure it is readable only to intended parties. Depending on the algorithms, protocols and implementation, a cryptographic system may be vulnerable to analysis, leading to possible cracking of the system. The ideal is an unbreakable system of which there is just one well known example: the one-time pad. The one-time pad is a system in which a randomly generated single-use private key is used to encrypt a message. The message is then decrypted by the receiver using a matching one-time pad and key. The challenge in this s

tag