Articles for author: Akshay Mishra

Akshay Mishra

Manchester Encoding

Manchester code, commonly known as phase encoding, is a line code used in communications and data storage in which each data bit is encoded either high then low, or low then high for an equal period of time. The signal is self-clocking and has no DC component. As a result, galvanically isolating electrical connections using the Manchester code is ...

Akshay Mishra

Simple Network Management Protocol

The Simple Network Management Protocol (SNMP) in computer networks is an Internet Standard protocol for gathering, organizing, and altering information about managed devices on IP networks to affect the behavior of the devices. SNMP in computer networks is commonly supported by cable modems, routers, switches, servers, workstations, printers, and other devices.For network monitoring, SNMP is ...

Akshay Mishra

Cellular Network

A cellular network is a radio network spread out over land in the form of cells, each of which has a base station permanently installed. Together, these cells offer broader geographic radio coverage. Therefore, even when the user equipment (UE), like a mobile phone, is moving through cells during transmission, communication is still possible. In ...

Akshay Mishra

Data Compression with Arithmetic Coding

Lossless and lossy data compression methods both employ the arithmetic coding process often. The approach uses entropy encoding, where symbols that are seen more frequently require fewer bits to encode than symbols that are seen less frequently. Compared to popular approaches like Huffman coding, it offers several benefits. You will have a thorough knowledge of ...

Akshay Mishra

Service Set Identifier

A service set identifier’s main purpose is to distinguish one wireless local area network from another that might be simultaneously broadcasting in the same area. A basic service set (BSS), a network of connected clients and access points, and an extended service set cooperate with a service set identification.A basic service set is a subset ...

Akshay Mishra

Wake-on-LAN protocol

A computer can be awakened or turned on by a network message thanks to the Wake-on-LAN (WoL) Ethernet or token ring networking standard. Scope What Is Wake-on-LAN? Wake-on-LAN (WoL or WOL) is an Ethernet or Token Ring computer networking protocol that enables a machine to be turned on or awakened by a network message.An application ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...

Akshay Mishra

Token Ring Protocol

A communication protocol used in local area networks is called the Token Ring protocol (LAN). The topology of the network determines the sequence in which stations send in a token ring protocol. A single ring of connections connects all of the stations. It makes use of a unique three-byte frame known as a “token” that ...

Akshay Mishra

Adding Security to Routing Protocols

The optimum route between the source and destination networks is found during the routing process by a layer 3 device (either a router or a layer 3 switch). Dynamic routing protocols are used to reduce administrator workload, i.e., administrators need to set up less, however by default, all routing information is exposed to all interested ...

Akshay Mishra

Shannon-Fano Algorithm for Data Compression

Lossless compression and lossy compression are two methods that can be used. In contrast to lossless compression, which preserves all data, lossy compression shrinks the size of the data by deleting extraneous information.For lossless data compression of multimedia, the Shannon-Fano Algorithm is an entropy encoding method. It gives each symbol a code depending on how ...