It helps identify access control devices such as application-based firewall or packet-filtering routers. Port scanning- Scanning is used to identify which ports are open and determine what service are available. Port scanning is like knocking on various doors and windows of house and seeing who answers [5]. One of the best port scanning tool is Nmap. It scans for both the TCP ports and UDP…
3.2. OS model: We all know about OS model as shown in figure (3). It has three basic layers: • Applications • OS • Hardware The OS can manage hardware for many application. OS separate between hardware and the applications giving advantage to programmers to innovate. 3. Control plane and Data plane separation 3.3. SDN separation of planes: SDN architecture looks like OS model as shown in figure (4). It consists of three layers: • Application layer: we can run here many kinds of application…
Part 1 What is data compression? Data compression is where a file is made smaller by shortening code where it is similar. This is helpful when transmitting files over the net, or in general just saving space of a SSD or Normal Hard drive. Data compression comes in two forms: Lossless Compression: Lossless compression is where similar parts of a file, are compressed by their similarities, however, the frequency is recorded and can be uncompressed without losing any extra data. This is usually…
BLUETOOTH TECHNOLOGY Introduction As with time, our need becomes our necessity. And it is said that, Necessity is father of all Invention. With time we need wireless technology that can replace cables such as Wi-Fi, Bluetooth. Bluetooth is also cable replacement technology that can connect different computer devices with a short-range wireless radio connection. It has wide areas of applications. Some of it’s features is • Low Complex Architechture, • Power Consumption is low • Less Price •…
rules and conventions which all devices have to comply to be able to connect with a network. Network protocols include Transfer Control Protocol / Internet Protocol (TCP/IP), Internetwork Packet exchange /Sequenced exchange (Novelle IPX/SPX), and IBM System Network Architecture (SNA).In the internet the most widely used protocol is TCP/IP stack which has become a…
final pieces of today’s Internet architecture were falling into place. January 1, 1983 saw the official deployment of TCP/IP as the new standard host protocol for ARPAnet (replacing the NCP protocol). The transition [RFC 801] from NCP to TCP/IP was a flag day event—all hosts were required to transfer over to TCP/IP as of that day. In the late 1980s, important extensions were made to TCP to implement host-based congestion control [Jacobson 1988]. The DNS, used to map between a human-readable…
Analysis of IPv6 Security challenges and vulnerability Abstract: The fast growth of the Internet and technology has a serious impact on our daily life. Almost everything around us has become connected to the Internet computers, appliances, medical devices, airplanes, and mobile devices. This rapid growth of connectivity has helped to develop the IPv6 to cover a numerous number of IP address and provide new services. The deployment of IPv6 provides many enhancements to the Internet…