Articles for author: Trapti Gupta

Trapti Gupta

Token Ring in Computer Networks

The token is a 3-byte small-size frame. And the token ring is one of the communication protocols in the Local Area Network(LAN). In a token ring, devices are connected in a ring topology and exchange tokens with each other. A token is required for a station to transmit data. What is Token Ring in Computer ...

Trapti Gupta

Web Server vs. Application Server

The web server provides run time for web applications and it is more relevant for the static pages whereas the application server provides runtime for the enterprise applications and it is more relevant for the dynamic pages. Apache Tomcat, Resin, etc. are examples of web servers. Weblogic, JBoss, Websphere, etc. are some of the examples ...

Trapti Gupta

Difference Between Connection-Oriented and Connectionless Services

Main difference between connection-oriented and connectionless is that connection-oriented service establishes a connection before data transmission whereas there is no connection establishment in connectionless service. TCP is a connection oriented and connectionless protocol is UPD. In this article, we will look at the difference between connection-oriented and connectionless services in detail. Connection-Oriented Services Every packet ...

Trapti Gupta

Routing Table

In a computer, when the data packet is transmitted from one network to another network, it is required to choose the best path for transmitting the packet. Hence, routing is the concept of the network layer of the OSI suite, which selects the best path for transmitting packets among the network. The router is a ...

Trapti Gupta

Cryptography and Network Security

Cryptography is a term used in data communication that refers to protecting the private information shared between two parties. Network Security refers to securing and protecting the network and data to ensure the confidentiality of data. What is Cryptography? Cryptography generally deals with the study and practice of techniques for ensuring secure communication between two parties ...

Trapti Gupta

What is Transport Layer Protocol?

In OSI suite, there are 7 layers and all layers provide different services. Today we are here with detailed information on one of the layers i.e. transport layer which provides process-to-process communication in OSI suite. Transport Layer in Computer Networks is an end-to-end layer that is used to deliver messages to a host. In OSI model, the transport layer ...

Trapti Gupta

Types of Area Networks – LAN, MAN and WAN

Computer Network is the interconnection of multiple devices. Mainly there are three types of computer networks: LAN (Local Area Network), WAN (Wide Area Network), and MAN (Metropolitan Area Network). LAN is used to connect devices in a small area like a building, office, etc. MAN covers the devices connected within a town or a city. WAN covers a large geographical area ...

Trapti Gupta

User Datagram Protocol (UDP)

The simplest protocol for transport layer communication is User Datagram Protocol (UDP). It has the bare minimum of communication channels. It is a best-effort delivery protocol that is regarded as unreliable. Because UDP doesn’t offer an acknowledgment mechanism, neither the sender nor the receiver sends an acknowledgment for a packet that has been received or sent. What is User ...

Trapti Gupta

Difference between Modem and Router

Modems and routers are very different networking devices and perform separate functions. A modem is a device that is used to connect networking devices to the Internet. A router is used to connect your devices to your home network (also known as a Local Area Network or LAN) or WiFi network so that your device ...

Trapti Gupta

What is Port?

Virtual points where network connections begin and stop are called ports. Ports are software-based and controlled by operating system. Each port is connected to a different procedure or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port number than webpages, for example, even though both reach ...