Monday, December 23, 2024

What is Gmail confidential mode: What is Gmail's confidential mode?,How to use Gmail confidential mode,How to open a confidential email

 Introduction:

Privacy is something that should concern us all. Therefore, it should be protected in all possible ways. It is well known that messaging or email applications do not usually stand out for their privacy; although there were many changes in these past months due to the latest scandals. This is the case with Gmail with its confidential mode
.
Gmail is the most used email application, thanks in part to being installed on Android by default. It is common for you to send emails using this application on the phone. sometimes there are private details or sensitive information we need to send. In such cases, we can use the confidential mode.

What is Gmail's confidential mode?


Confidential mode is a function in Gmail that guarantees maximum privacy when sending an email.

It is an ideal method to send sensitive or private information to another person so that only that person can open that email. It is a great advantage that this function offers us.

Tuesday, December 17, 2024

How to Index Blog Post In Google search console In 2025 [Step By Step Guide for Beginners]

Search engine traffic is the key to building any profitable blog. But here’s the thing: if Google doesn’t index your site, you will NOT get a single visitor.

If you want Google to rank your pages, index your site first. Whether you are looking for Google to index your new site or blog post to quickly index your new blog posts, this post is for you.

The first thing you want to happen after launching a blog or website is to get it indexed by Google. Not indexing a site on Google is one of the biggest mistakes most new bloggers make.


The very first thing you need to remember is: that it’s free to index your new sites on Google. You don’t have to pay anything. But doing it for the first time is tricky.

1. Submit your website to Google

If you want to get Google to index your new site, you must submit your URL to Google from Google Search Console (GSC). For that, you need to create a free account on Webmaster tools using your Google account.

Here’s a simple step-by-step tutorial on how to submit your site to Google so it can start being indexed in search results.

Step 1: Click here to visit Google Search Console. Once you click on the link, you’ll be asked to select a property type.

s you can see above, you’ll find two options. One is to enter a domain name or URL prefix.

For domain type, DNS (Domain Name Service) verification is required whereas, for URL prefix, you can find multiple verification methods.

Step 2: We recommend you to try their URL prefix as it allows you to verify your site’s ownership in multiple methods. Once you enter your site’s URL address, here’s what it shows.

As you can see above, it asks you to verify your ownership.

Monday, December 9, 2024

What is OSI Model? – Layers of OSI Model: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer

The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers with specific functions and responsibilities.


This layered approach makes it easier for different devices and technologies to work together. The OSI Model provides a clear structure for data transmission and managing network issues. It is widely used as a reference to understand how network systems function.

In this article, we will discuss the OSI Model and each layer of the OSI Model in detail. We will also discuss the flow of data in the OSI Model and how the OSI Model is different from the TCP/IP Model.

OSI-Model

OSI Model

Aiming for a top All India Rank in the GATE CS & IT 2025 exam, but not sure where you stand?
We’ve got you covered! Our GATE CS & IT Test Series – 2025 is designed to give you the edge you need. With previous year's questions, subject-wise and full-length mock tests, and the All India mock Test, you can get a real feel of the exam. Plus, get our live mentorship classes with experts and attend live doubt-solving sessions to clear all your queries.

Layers of the OSI Model

There are 7 layers in the OSI Model and each layer has its specific role in handling data. All the layers are mentioned below:

  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

Layer 1 – Physical Layer

The lowest layer of the OSI reference model is the Physical Layer. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits. The physical Layer is responsible for transmitting individual bits from one node to the next. When receiving data, this layer will get the signal received convert it into 0s and 1s, and send them to the Data Link layer, which will put the frame back together. Common physical layer devices are HubRepeaterModem, and Cables.

physical-layer-in-OSI

Physical Layer

Functions of the Physical Layer

  • Bit Synchronization: The physical layer provides the synchronization of the bits by providing a clock. This clock controls both sender and receiver thus providing synchronization at the bit level.
  • Bit Rate Control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second.
  • Physical Topologies: The physical layer specifies how the different, devices/nodes are arranged in a network i.e. bus topologystar topology, or mesh topology.
  • Transmission Mode: The physical layer also defines how the data flows between the two connected devices. The various transmission modes possible are Simplex, half-duplex, and full-duplex.

The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the Host using its MAC address. The packet in the Data Link layer is referred to as Frame. Switches and Bridges are common Data Link Layer devices.

The Data Link Layer is divided into two sublayers:

  • Logical Link Control (LLC)
  • Media Access Control (MAC)

The packet received from the Network layer is further divided into frames depending on the frame size of the NIC(Network Interface Card). DLL also encapsulates the Sender and Receiver’s MAC address in the header.

The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request onto the wire asking “Who has that IP address?” and the destination host will reply with its MAC address.

Functions of the Data Link Layer

  • Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the beginning and end of the frame.
  • Physical Addressing: After creating frames, the Data link layer adds physical addresses ( MAC addresses ) of the sender and/or receiver in the header of each frame.
  • Error Control: The data link layer provides the mechanism of error control in which it detects and retransmits damaged or lost frames.
  • Flow Control: The data rate must be constant on both sides else the data may get corrupted thus, flow control coordinates the amount of data that can be sent before receiving an acknowledgment.
  • Access Control: When a single communication channel is shared by multiple devices, the MAC sub-layer of the data link layer helps to determine which device has control over the channel at a given time.

Layer 3 – Network Layer

The network layer works for the transmission of data from one host to the other located in different networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender and receiver’s IP address are placed in the header by the network layer. A segment in the Network layer is referred to as Packet. The network layer is implemented by networking devices such as routers and switches.

Functions of the Network Layer

  • Routing: The network layer protocols determine which route is suitable from source to destination. This function of the network layer is known as routing.
  • Logical Addressing: To identify each device inter-network uniquely, the network layer defines an addressing scheme. The sender and receiver’s IP addresses are placed in the header by the network layer. Such an address distinguishes each device uniquely and universally.

Layer 4 – Transport Layer

The transport layer provides services to the application layer and takes services from the network layer. The data in the transport layer is referred to as Segments. It is responsible for the end-to-end delivery of the complete message. The transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data if an error is found. Protocols used in the Transport Layer are TCPUDP  NetBIOS, and PPTP.

At the sender’s side, the transport layer receives the formatted data from the upper layers, performs Segmentation, and also implements Flow and error control to ensure proper data transmission. It also adds the Source and Destination port number in its header and forwards the segmented data to the Network Layer.

  • Generally, this destination port number is configured, either by default or manually. For example, when a web application requests a web server, it typically uses port number 80, because this is the default port assigned to web applications. Many applications have default ports assigned.

At the Receiver’s side, the Transport Layer reads the port number from its header and forwards the Data that it has received to the respective application. It also performs sequencing and reassembling of the segmented data.

Functions of the Transport Layer

  • Segmentation and Reassembly: This layer accepts the message from the (session) layer, and breaks the message into smaller units. Each of the segments produced has a header associated with it. The transport layer at the destination station reassembles the message.
  • Service Point Addressing: To deliver the message to the correct process, the transport layer header includes a type of address called service point address or port address. Thus by specifying this address, the transport layer makes sure that the message is delivered to the correct process.

Services Provided by Transport Layer

  • Connection-Oriented Service
  • Connectionless Service

Layer 5 – Session Layer

Session Layer in the OSI Model is responsible for the establishment of connections, management of connections, and terminations of sessions between two devices. It also provides authentication and security. Protocols used in the Session Layer are NetBIOS, and PPTP.

Functions of the Session Layer

  • Session Establishment, Maintenance, and Termination: The layer allows the two processes to establish, use, and terminate a connection.
  • Synchronization: This layer allows a process to add checkpoints that are considered synchronization points in the data. These synchronization points help to identify the error so that the data is re-synchronized properly, and ends of the messages are not cut prematurely and data loss is avoided.
  • Dialog Controller: The session layer allows two systems to start communication with each other in half-duplex or full-duplex.

Example

Let us consider a scenario where a user wants to send a message through some Messenger application running in their browser. The “Messenger” here acts as the application layer which provides the user with an interface to create the data. This message or so-called Data is compressed, optionally encrypted (if the data is sensitive), and converted into bits (0’s and 1’s) so that it can be transmitted.

Communication in Session Layer

Communication in Session Layer

Layer 6 – Presentation Layer

The presentation layer is also called the Translation layer. The data from the application layer is extracted here and manipulated as per the required format to transmit over the network. Protocols used in the Presentation Layer are JPEGMPEGGIFTLS/SSL, etc.

Functions of the Presentation Layer

  • Translation: For example, ASCII to EBCDIC .
  • Encryption/ Decryption: Data encryption translates the data into another form or code. The encrypted data is known as the ciphertext and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data.
  • Compression: Reduces the number of bits that need to be transmitted on the network.

Layer 7 – Application Layer

At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network applications. These applications produce the data to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user. Protocols used in the Application layer are SMTPFTPDNS, etc.

application-layer-in-OSI

Application Layer

Functions of the Application Layer

The main functions of the application layer are given below.

  • Network Virtual Terminal(NVT): It allows a user to log on to a remote host.
  • File Transfer Access and Management(FTAM): This application allows a user to access files in a remote host, retrieve files in a remote host, and manage or control files from a remote computer.
  • Mail Services: Provide email service.
  • Directory Services: This application provides distributed database sources and access to global information about various objects and services.
============================================================

"This Content Sponsored by Buymote Shopping app

BuyMote E-Shopping Application is One of the Online Shopping App

Now Available on Play Store & App Store (Buymote E-Shopping)

Click Below Link and Install Application: https://buymote.shop/links/0f5993744a9213079a6b53e8

Sponsor Content: #buymote #buymoteeshopping #buymoteonline #buymoteshopping #buymoteapplication"

===========================================================================

Monday, December 2, 2024

Simple Mail Transfer Protocol (SMTP):Model of SMTP System,How does SMTP Work,The SMTP model is of two types

Simple Mail Transfer mechanism (SMTP) is a mechanism for exchanging email messages between servers. It is an essential component of the email communication process and operates at the application layer of the TCP/IP protocol stack. SMTP is a protocol for transmitting and receiving email messages. In this article, we are going to discuss every point about SMTP.

What is Simple Mail Transfer Protocol?Simple Mail Transfer ProtocolSMTP Protocol

  • End-to-End Method
  • Store-and-Forward Method
The client SMTP initiates the session, so let us call it the client SMTP. The server SMTP responds to the session request, so let us call it the receiver SMTP. The client SMTP starts the session, and the receiver SMTP responds to the request. 
Model of SMTP System: SMTP ModelComponents of SMTP
  • Mail User Agent (MUA): It is a computer application that helps you in sending and retrieving mail. It is responsible for creating email messages for transfer to the mail transfer agent(MTA).
  • Mail Submission Agent (MSA): It is a computer program that receives mail from a Mail User Agent(MUA) and interacts with the Mail Transfer Agent(MTA) for the transfer of the mail.
  • Mail Transfer Agent (MTA): It is software that has the work to transfer mail from one system to another with the help of SMTP.
  • Mail Delivery Agent (MDA): A mail Delivery agent or Local Delivery Agent is basically a system that helps in the delivery of mail to the local system. 
Youtube Channel Image
Nadaipazhagu Tamizhaa Subscribe To watch Videos
Subscribe