Articles for author: Aditya Saxena

Aditya Saxena

WebSocket

A WebSocket is a full-duplex and bidirectional protocol used in the client-server communication channels. A WebSocket address starts with wss:// or ws://. It is a stateful protocol, implying that the connection between the server and the client is kept alive until either client or server terminates it. After closing the connection by either the server ...

Aditya Saxena

Diffie-Hellman Algorithm Implementation

The Diffie-Hellman Algorithm is a secure way of cryptographic keys exchange across a public channel. It was among the very first public-key protocols. Ralph Merkle came up with the Diffie-hellman key exchange and it was named after Whitfield Diffie and Martin Hellman. Within the fields of cryptography, DH (Diffie-Hellman) is the earliest example of public ...

Aditya Saxena

Collision Avoidance in Wireless Networks

In computer networking, a collision happens when multiple devices attempt to transfer data via a commonly shared circuit. In a common circuit, various devices may listen at the same time, but only one device at a time is allowed to transmit data. This requires that all other devices listen to the transmission. Many devices are ...

Aditya Saxena

Throughput in Computer Networks

Throughput in computer networking is the rate of successful transmission of messages over a channel of communication, such as packet radio, Ethernet, etc. The data contained in these messages may be delivered through network nodes, or over logical or physical links. Throughput is mostly measured in B.P.S. (Bits Per Second). The throughput of a network ...

Aditya Saxena

Program for IP Forwarding Table Lookup

There exists a routing table in the Unix operating system consisting of several tuples that contain the I.P. (Internet Protocol) address of the network, the subnet mask, the IP address of the gateway, and the name of the interface. This information is required for forwarding packets to the exterior of the network for connecting to ...

Aditya Saxena

Flooding in Computer Networks

Flooding is a technique of routing in computer networking, in which a sender node transmits packets via all the outgoing links. Flooding is similar to broadcasting in that it happens when sender packets are transferred without routing data to each network node attached. Since flooding naturally utilizes each route in the network, flooding algorithms are ...

Aditya Saxena

Program to Calculate the Round Trip Time

Round-trip time(RTT) in networking, also called the round-trip delay time is a benchmark that measures the amount of time it takes for a data packet to be sent in addition to the amount of time it takes for acceptance of that signal to be received in milliseconds. RTT delay also includes propagation times between two ...

Aditya Saxena

Onion Routing

Onion routing is a method of communicating anonymously over a network. A data message is contained within several layers of encryption, in an onion network. This data is transferred via a sequence of network nodes known as onion routers—the onion routers "peel" away one layer, revealing the next destination of the data. Once the decryption ...