Computer Network

Computer Network Archives from Computer Service Solutions contain the well presented material for understanding the concepts of Computer networks. Since Computer Network is one of the booming Industries in Information Technology right now. Students from all over the world should know the basic concepts of networking in order to understand any technology.

The objective of Computer Service Solution is to make techies aware of latest networking technologies, news, trends and opportunities. We are delivering the quality content so that people even from non-technical background can understand how networking is affects us.

Unlike other network archives, This blog is also focusing on the security practices while implementing Network technologies. So you will not only learn about it but also about how to prevent it from cyber attacks.

SSH protocol Everything you need to know

SSH Protocol | Complete Process, Attack, and Security. Everything you need to know

Secure Shell (SSH) runs on port number 22 and used for the purpose of secure data communication over an unsecured or less secure network. With SSH, Remote code execution became easy with SSH. Running on the top of TCP/IP for securing the data over the network makes it a transport layer protocol. But when used for the remote login purpose, we call it an application layer protocol. Secure socket sell… Read More »SSH Protocol | Complete Process, Attack, and Security. Everything you need to know

DHCP Protocol with diagram explained

DHCP Protocol | Complete Process, Attack, and Security. Everything you need to know

DHCP stands for Dynamic Host configuration protocol. It is used to dynamically assign IP addresses to the systems. We require IP addresses to access the internet for communication purposes. It acts as an identifier for a network device like you have a location so letters can be sent to you likewise a web page cannot be downloaded without an IP address, so to make the internet accessible IP address should… Read More »DHCP Protocol | Complete Process, Attack, and Security. Everything you need to know

SNMP PROTOCOL WORKING EXPLAINED

SNMP Protocol | Complete Process, Commands, Attacks and Security

Simple Network Management Protocol [SNMP Protocol(Port 161, 162)]  Introduced in 1988, the Simple Network Management Protocol used to meet the purpose of network and Internet Protocol-based device management and monitoring. SNMP uses UDP port 161 & 162. It aims at providing a common language to all the network devices which helps them to communicate with each other. SNMP helps network devices like router, switches, hub, etc to share information. It… Read More »SNMP Protocol | Complete Process, Commands, Attacks and Security

Process of SMTP Mail transfer

SMTP Protocol | Complete Process, Commands, Attacks and Security

Simple Mail Transfer Protocol [SMTP (Port 25)] SMTP was introduced in 1982 as a communication protocol for email transmission. It consists a set of communication guidelines that enable email transmission over the internet. These guidelines include rules for communication between the servers. SMTP also provides the error management feature for incorrect emails. SMTP Server consists of 2 things: UA (User Agents) and MTA (Mail Transfer Agents) UA: Used to form… Read More »SMTP Protocol | Complete Process, Commands, Attacks and Security