Articles for author: Trapti Gupta

Trapti Gupta

Carrier Sense Multiple Access

In Carrier Sense Multiple Access (CSMA) protocol, the station will sense the channel before the transmission of data. CSMA reduces the chances of collision in the network but it does not eliminate the collision from the channel. 1-Persistent, Non-Persistent, P-Persistent, and O-Persistent are the three access methods of CSMA. What is Carrier Sense Multiple Access ...

Trapti Gupta

Challenge Response Authentication Mechanism

CRAM stands for Challenge Response Authentication Mechanism and it is a set of protocols used for authenticating a user by giving them a challenge and access is provided to the user only if they answer the challenges correctly.CAPTCHA is one example of Challenge Response Authentication. Introduction The Challenge Response Authentication mechanism is abbreviated as CRAM ...

Trapti Gupta

Spanning Tree Protocol

Spanning Tree protocol is a link management protocol. It is used for creating a loop-free network. It is also a layer-2 protocol that runs on bridges and switches. In IEEE standard, it is standardized as IEEE 802.1D. Introduction What is STP? STP is a link management protocol and also a layer 2 protocol. STP generally ...

Trapti Gupta

Difference between Byte Stuffing and Bit Stuffing

At the receiver end the data bits stream, received from the physical layer is divided into the frames on the data link layer. Data frames can have fixed or variable length sizes. The size of every frame is different in variable framing so bit patterns are used in starting and end of the data frame. ...

Trapti Gupta

Asynchronous Transfer Mode

ATM stands for Asynchronous Transfer Mode and ATM is a switching technique that uses time division multiplexing for the communication of the data. And it is a connection-oriented technology. Data is converted in the fixed and small-size cells in the ATM. Introduction to Asynchronous Transfer Mode (ATM) The full form of the ATM is Asynchronous ...

Trapti Gupta

TCP Sequence Number and Wrap Around Concept

TCP is a connection-oriented transport layer protocol. The TCP sequence number is a 32-bit number that helps in providing a sequence number that is suitable with other transmitting bytes of the TCP connection. TCP sequence number uniquely identifies each data byte as it is a stream-oriented protocol.Using a sequence number over and again for maintaining ...

Trapti Gupta

Context-based Access Control

Context Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall and filtering of traffic is performed by it at the different OSI model layers. Traffic Filtering, Traffic Examine, Intrusion Prevention, and alert and audit traits are done by the CBAC. Introduction Context Based ...

Trapti Gupta

Distance Vector Routing v/s Link State Routing

Routing is the process of choosing the path in the network. Distance vector routing is the routing protocol that selects the path based on parameter distance. Link State routing protocol is the protocol that chooses the best path based on the cost of the path. Introduction to Routing Routing decides the best path for the ...

Trapti Gupta

Piggybacking in Computer Networks

Piggybacking is a process of attaching acknowledgment with the data packet to be sent. It is an efficient solution for reducing the bandwidth utilization of the network. TCP is a full-duplex communication protocol, so piggybacking is used to transmit packets. Introduction to Piggybacking Piggybacking is a process of attaching the acknowledgment with the data packet ...

Trapti Gupta

Authentication, Authorization, and Accounting

AAA (Authentication, Authorization, and Accounting) is a framework that allows access to network resources. User identification is the process of authentication and then what resources access is allowed to the user is decided by the authorization. Accounting is used to determine the usage of network resources. Introduction to AAA AAA stands for Authentication, Authorization, and ...