Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
The application layer in the (OSI) model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers.
An application layer protocol defines how the application processes running on different systems, pass the messages to each other.
WORKING
Dynamic Domain Name System (DDNS): It is a method of automatically updating a name server in the Domain Name Server (DNS), often in real-time, with the active DDNS configuration of its configured hostnames, addresses, or other information.
By using DDNS, users can create a hostname (e.g. “myhome.dyndns.org”) that will always point to their router’s current IP address, making it easy to connect to devices on their home network from anywhere in the world.
Advantages :
for eg-telnet the.libraryat.whatis.ed
The result of this request would be an invitation to log on with a user ID, and then the program would prompt the user for a password. If accepted, the user is granted access to the remote host.
Electronic mail (e-mail) is a computer-based program that allows users to send and receive messages. E-mail is the electronic version of a letter, but with time and flexibility advantages. While a letter can take anywhere from a week to a couple of months to reach its intended destination, an e-mail is sent virtually almost instantly.
Messages in the mail contain not just text but also photos, audio, and video data. A person sending an e-mail is a sender, and the person receiving it is the recipient.
Services offered by Electronic Mail
Composition: Creating messages and responses is referred to as composition.
Transfer: Sending mail from the sender to the receiver is known as a transfer.
Reporting: Mail delivery confirmation is known as reporting. It allows users to see if
their mail has been delivered, misplaced, or rejected.
Displaying: It refers to presenting messages so that the user can understand them.
Disposition: This stage concerns the recipient's actions after receiving mail, such as saving it, deleting it before reading it, or after reading it.
Bluetooth is universal for short-range wireless voice and data communication. It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging data over smaller distances.
Advantage:
Disadvantages:
HyperText Transfer Protocol (HTTP) and File Transfer Protocol(FTP) are the protocols used for file transfer between client and server. There is a lot of difference between FTP and HTTP. In this article, we will learn what are the differences between HTTP and FTP.
File Transfer Protocol (FTP) :
It stands for File Transfer Protocol. It is an internet standard that allows the process of file downloading and uploading on different computers from the internet. FTP site consists of different types of files(text, graphics, videos, images, etc). It was developed when security was not a big issue. It is older and is being replaced with new protocols. FTP supports two separate Transmission Control Protocols the first one is a control connection or command port (port 21 ) to authenticate the user and the second one is a data connection or data port(port 20) to transfer the files. It requires a specific username and password for access.
HyperText Transfer Protocol (HTTP) :
It stands for HyperText Transfer Protocol. It is the backbone of WWW. It is an internet standard that allows the process of transfer of web pages over the internet. It also defines how the web browser will respond to any web request. The web address of all the web pages contains a protocol, domain name, and path to the web page. Most of the web address contains http:// in their URL to show the HTTP protocol. HTTP works similar to the combined functions of FTP and SMTP. It also uses Transmission Control Protocol.
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
Advantages of firewalls
Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”. In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions.
Techniques used For Cryptography: In today’s age of computers cryptography is often associated with the process where an ordinary plain text is converted to cipher text which is the text made such that intended receiver of the text can only decode it and hence this process is known as encryption. The process of conversion of cipher text to plain text this is known as decryption.
Features Of Cryptography are as follows: