Articles for category: Computer Network

Trapti Gupta

Near Field Communication (NFC)

Near Field Communication is abbreviated as NFC and it is the technology that uses radio waves for the transmission of data between two devices and it is a wireless technology that provides a contactless payment facility to the user. NFC is used in Smart Cards, e-wallets, Smart Ticketing, Medicine and Healthcare, etc. What is NFC ...

Siddhi Gupta

Application Layer Protocols in Computer Network

The application layer is primarily responsible for setting up a model to identify communication methods to allow users and hosts to interact with the software applications available on the internet. Several application layer protocols help in the efficient working of our application layer in the network model. The protocols work similarly in different network models that have ...

Trapti Gupta

Advanced Networking

Advanced networking provides flexibility so that guest networks can be easily defined. Advanced networking is a high throughput computing. WireCap is a packet capture engine, and for accelerating the movement of data Multicore-Aware Data Transfer Middleware (MDTM) project has been developed. BigData Express, SENSE, N-able N-sight, Paessler Network Troubleshooting with PRTG, etc., are some of the terms used in the ...

Priyanshu Pandey

Types of Transmission Media

A transmission media in data communication is a physical path between the sender and the receiver and it is the channel through which data can be sent from one location to another. Data can be represented through signals by computers and other sorts of telecommunication devices. These are transmitted from one device to another in ...

Priyanshu Pandey

Linux Networking Commands

Linus Torvalds created Linux entirely from scratch. It is created as open-source software, which is inherently very strong and secure. Anyone can install Linux and modify it to create their own Linux version. These Linux versions are known as “distros” or “distributions.” The Linux kernel’s unrivaled security and reliability, combined with its open-source nature, make it one of ...

Trapti Gupta

What is Supernetting?

Supernetting is the process of aggregation of multiple networks into a single network, and it is an inverse process of subnetting. CIDR Value, Network ID, Subnet Mask, Broadcast ID, and Block Size of the route ID are the information required for performing the Supernetting. Supernetting can only be performed on those networks that satisfy the three rules that are explained in this ...

Trapti Gupta

Open Shortest Path First (OSPF) Protocol

OSPF stands for Open Shortest Path First and it is an intradomain protocol. This protocol is used for exchanging information between the dynamic routers. OSPF protocol is based on the link state routing algorithm. OSPF is used within the autonomous system and it divides the autonomous system into different areas. Introduction OSPF Areas Refer to the ...

Trapti Gupta

Digital Subscriber Line (DSL)

Digital Subscriber Line is abbreviated as DSL and provides the service of internet transmission with the help of a copper wire telecommunication line. And it maintains the speed of transferred data. Asymmetric DSL (ADSL), Consumer DSL (CDSL), DSL Lite, High-bit-rate DSL (HDSL), etc. are the types of DSL. What is DSL? A communication medium that provides the service of transferring internet using ...

Priyanshu Pandey

EIGRP Configuration

Enhanced Interior Gateway Routing Protocol (EIGRP) is a dynamic network-layer protocol with protocol number 88, initially a Cisco proprietary system but transitioning toward an open standard. EIGRP facilitates classless routing, VLSM, route summarization, and efficient load balancing. Unlike earlier protocols like IGRP or BGP, EIGRP enhances data exchange efficiency among routers. Born from Cisco’s 1990s initiative ...

Trapti Gupta

Controlled Access Protocols

In controlled access protocols, communication on a shared medium is regulated to prevent data collisions. Each station consults with others to determine which has the transmission right, allowing only one node to send data at a time. This method ensures efficient data transfer without conflicts. The three primary controlled access techniques are Reservation, Polling, and ...