Computer Networks

Tunneling

Tunneling, also known as “port forwarding,” is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way...

Network address translation

NAT (Network Address Translation or Network Address Translator) is the translation of an Internet Protocol address (IP address) used within one network to a different IP address known within...

DHCP

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the...

Comaprison between TCP and UDP

Acronym for Transmission Control Protocol User Datagram Protocol or Universal Datagram Protocol Connection TCP is a connection-oriented protocol. UDP is a connectionless protocol. Function As a message makes its...

Duties of Transport layer

The four main functions of the Transport layer are:   Segment and assemble upper-layer applications Transport segments from one host to another host Establish and manage end-to-end operations Error...

MIME (Multi-Purpose Internet Mail Extensions)

MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the...

POP3

POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held...

E-mail Architecture and Services

The message security service is hosted, actual detection and filtering of suspicious mail occurs not in your email environment, but at our external data center. This is a robust...

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) is an error reporting and diagnostic utility and is considered a required part of any IP implementation. Understanding ICMP and knowing what can possibly...

Firewall

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of...