HTTPS vs HTTP

https-vs-http

HTTPS is HTTP with encryption. The difference between these two protocols is that HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses. As a result, HTTPS is more secure than HTTP. A website that uses HTTP has http:// in its URL, while a website …

Read more

How to do Network Security

How to do Network Security

Network security refers to the practice of securing computers and devices in a network from unauthorized users and attacks. Network security can range from simple procedure such as using a username and password to using complex network devices to protect …

Read more

Different Wide Area Networks

Wireless WAN

ISDN (Integrated Services Digital Network) ISDN is circuit switched network that enables digital transmission over telephone lines. It allows data, valce; video transmissions aver a single line and multiple devices can use the same communication line. ISDN is widely used …

Read more

Wide Area Networks

Dial­up

A Wide Area Network (WAN) is a network that covers a broad area (metropolita regional, or national boundaries) using private or public network transports. Using WANS, data can be transmitted over very long distances. There are a variety of WAN …

Read more

How to do Wireless Security

Wireless Security

Overview of Wireless Security Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Due to affordability of Wi-Fi Routers, Internet access through wireless means have gained popularity. Today, almost every laptop and Smartphone is …

Read more

What are Server Operating Systems

Server Operating Systems

Server Operating Systems (SOS) are system software that run on a server and enable the server to manage data, users, groups, security, applications, and other networking functions. SOS use the client/server architecture. Popular network operating systems are Microsoft Windows Server …

Read more

Transport Layer Protocols TCP and UDP

Transport Layer Protocols TCP and UDP

You have learnt about IP Addressing and IP assignment in the earlier articles. While network layer protocols are used for logical addressing and routing, transport layer protocols provide end-to-end communication between hosts or computers on a TCP/IP Network. Transport Layer …

Read more

What are protocols in networking

Protocols are a set of standards that allow network devices to communicate and exchange information. Protocols define how devices start, manage and end communication; most protocols are described by IETF (Internet Engineering Task Force) as RFC’s (Request for Comments). Protocols …

Read more