Articles for category: Computer Network

Mansi

Congestion Control

TCP congestion window and congestion policy are used to avoid network congestion. As the network is the main component in wireless communication, any congestion in a network must be avoided. If the data sent by the sender is not delivered by the network, it must inform the sender about it. The network, other than the ...

Snehal Jadhav

Distance Vector Routing Algorithm

Distance vector is the “Dynamic Routing” protocol. Distant vector protocol also called as Bellman-Ford algorithm used to calculate the shortest path. What is Distance Vector Routing (DVR) Protocol? Distant vector routing protocol also called as Bellman-Ford algorithm or Ford Fulkerson algorithm used to calculate a path. A distance-vector protocol calculates the distance and direction of ...

Sushant Gaurav

Synchronous Optical Network (SONET)

SONET (Synchronous Optical Network) is a standardized form of protocol that is used in digital communication between the sender and the receiver. It uses a fiber optic medium to transmit a huge amount of data across a large distance. SONET helps us to transmit data over larger distances with greater data transmission rates. We have ...

Aditya Saxena

Collision Avoidance in Wireless Networks

In computer networking, a collision happens when multiple devices attempt to transfer data via a commonly shared circuit. In a common circuit, various devices may listen at the same time, but only one device at a time is allowed to transmit data. This requires that all other devices listen to the transmission. Many devices are ...

Aditya Saxena

Throughput in Computer Networks

Throughput in computer networking is the rate of successful transmission of messages over a channel of communication, such as packet radio, Ethernet, etc. The data contained in these messages may be delivered through network nodes, or over logical or physical links. Throughput is mostly measured in B.P.S. (Bits Per Second). The throughput of a network ...

Priyanshu Pandey

Difference between HTTP and HTTPS

Have you ever seen http:// or https:// in a browser’s address bar while browsing a website? Both protocols allow a web server and a web browser to exchange data related to a specific website. What distinguishes these two, though? Well, https is secure since it has an extra s in it! The very short and ...

Sushant Gaurav

Build a Chatroom in Python

A chatroom is a minimal chatting application. A chatroom is a minimal server that we can create and allow several clients to connect. All the clients that are connected to the server can transfer messages and data to one another via the central server. In this project, we will broadcast our message to every client ...

Saksham Arya

Variable Length Subnet Mask

VLSM stands for variable length subnet mask is a concept that is used to divide a network into multiple subnetworks of different lengths. Introduction to Variable Length Subnet Mask (VLSM) VLSM is a concept that is used to divide a network into multiple subnetworks of different lengths and sizes. VLSM is very commonly used in ...

Prithvi Raj Kumar

How to Calculate Subnet Information for an IPv4 Address?

Subnetting is the practice of logically dividing a single large IPV4 subnet address network into multiple networks for better performance.A Subnet Mask is used to denote the network size in the subnetting process. In networking, there are two types of broadly used addresses available in this world. They are the IPV4 address and the IPV6 ...

Shivam Verma

LZW

LZW (Lempel–Ziv–Welch) is a universal lossless data compression technique. This compression algorithm was developed by Abraham Lempel, Jakob Ziv, and Terry Welch. In hardware implementations, the algorithm is simple and has the potential for very high throughput. It is the algorithm used in the GIF image format and is part of the widely used Unix ...