Articles for author: Akshay Mishra

Akshay Mishra

Service Set Identifier

A service set identifier’s main purpose is to distinguish one wireless local area network from another that might be simultaneously broadcasting in the same area. A basic service set (BSS), a network of connected clients and access points, and an extended service set cooperate with a service set identification.A basic service set is a subset ...

Akshay Mishra

Token Ring Protocol

A communication protocol used in local area networks is called the Token Ring protocol (LAN). The topology of the network determines the sequence in which stations send in a token ring protocol. A single ring of connections connects all of the stations. It makes use of a unique three-byte frame known as a “token” that ...

Akshay Mishra

Adding Security to Routing Protocols

The optimum route between the source and destination networks is found during the routing process by a layer 3 device (either a router or a layer 3 switch). Dynamic routing protocols are used to reduce administrator workload, i.e., administrators need to set up less, however by default, all routing information is exposed to all interested ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...

Akshay Mishra

Shannon-Fano Algorithm for Data Compression

Lossless compression and lossy compression are two methods that can be used. In contrast to lossless compression, which preserves all data, lossy compression shrinks the size of the data by deleting extraneous information.For lossless data compression of multimedia, the Shannon-Fano Algorithm is an entropy encoding method. It gives each symbol a code depending on how ...

Akshay Mishra

Telnet in Computer Networks

TELNET is an acronym for TErminaL-NETwork. It is a form of protocol that makes it possible for one computer to connect to a nearby computer. It is employed as a common TCP/IP protocol for the virtual terminal service provided by ISO. The local computer is the one that establishes the connection. A remote computer is ...

Akshay Mishra

Routed Protocols vs Routing Protocols

A routed protocol allows for data routing. IP and AppleTalk are two examples of routed protocols. An addressing method is necessary for such a protocol. You may determine the network that a host belongs to as well as where that host is located on that network by using the addressing scheme. A routed protocol can ...

Akshay Mishra

Dynamic Host Configuration Protocol

Automatic distribution and assignment of IP addresses, default gateways, and other network characteristics to client devices are performed by a DHCP server, a type of network server. For clients to successfully communicate on the network, a DHCP server automatically delivers the necessary network parameters. Without it, the network administrator must manually configure each new client ...

Akshay Mishra

Multiplexing TCP and UDP Socket

All protocol architectures that have ever been created offer multiplexing and demultiplexing features. The source port number field and the destination port number field are two unique fields that UDP and TCP use to conduct the demultiplexing and multiplexing tasks in the segment headers.Multiplexing is the act of assembling data from several application processes of ...

Akshay Mishra

Network Layer Design Issues

Network layer design involves key challenges: routing, addressing, and forwarding. Routing protocols determine paths for data packets, balancing efficiency and reliability. Addressing assigns unique identifiers to devices. Forwarding directs packets based on addresses. Quality of Service (QoS) ensures performance levels. Security must safeguard data. Scalability addresses growth. Interoperability supports different technologies. Congestion control manages data ...