Posts

Showing posts from May, 2021

Connection-oriented vs Connection-less packet switching

Image
  Below shows the comparison of  connection-oriented packet switching network and connection-less packet switching ,   In connection oriented packet switching packets are follow a same route source to the destination while in connectionless packet switching packets don’t follow same route,so in connectionless packets may arrive to the destination in a random manner so it’s required to stored and rearrange the arriving packets. This is a disadvantage of connectionless over connection-oriented packet switching   In connectionless packet switching when if there any kind of fault in some choosed transmission link then packets route in a alternative path ,so this is a advantage over connection oriented packet switching(because connection oriented packet switching there is a initial route setup between sender and receiver)   Connection oriented is reliable data transfer while connectionless is unreliable. In connectionless there is no initial setup of the connection between sender and the re

PGP Encryption

Image
What is PGP PGP (Pretty Good Privacy) encryption is a data encryption computer program that used to encrypt and decrypt email over the internet and used to authenticate messages with digital signatures and encrypted stored flies. This was invented by Philip R.Zimmermann in 1991. In PGP encryption, It uses a mix of data compression , hashing and public-key cryptography. And also symmetric and asymmetric keys use to encrypt data that transferred across networks.   How PGP works Consider a situation Alice (Sender) send a Email message to Bob (Receiver) At Sender Side                                                                                                                         Figure 01 : Sender side process of PGP   Below show each steps as description according to the above Figure 01 Numbering. 1.      As the 1 st step ,the Email message is hashed to create a digest 2.      Above created digest is encrypted using Alice’s private key 3.      Encrypted dige