Articles for category: Computer Network

Sushant Gaurav

Sliding Window Protocol

The sliding window protocol is a data link layer protocol that is useful in the sequential and reliable delivery of the data frames. Using the sliding window protocol, the sender can send multiple frames at a time. The sliding window protocol uses a mechanism of sequence numbers. The sender associates a sequence number to the ...

Priyanshu Pandey

Multiplexing in Computer Networks

Multiplexing is a technique that allows different analog and digital transmission streams to be handled at the same time across a shared link. Multiplexing converts a high-capacity medium into a low-capacity logical medium, subsequently shared by multiple streams. The process of combining data streams or input is called Multiplexing, and the hardware used for multiplexing ...

Mansi

Congestion Control

TCP congestion window and congestion policy are used to avoid network congestion. As the network is the main component in wireless communication, any congestion in a network must be avoided. If the data sent by the sender is not delivered by the network, it must inform the sender about it. The network, other than the ...

Snehal Jadhav

Distance Vector Routing Algorithm

Distance vector is the “Dynamic Routing” protocol. Distant vector protocol also called as Bellman-Ford algorithm used to calculate the shortest path. What is Distance Vector Routing (DVR) Protocol? Distant vector routing protocol also called as Bellman-Ford algorithm or Ford Fulkerson algorithm used to calculate a path. A distance-vector protocol calculates the distance and direction of ...

Sushant Gaurav

Synchronous Optical Network (SONET)

SONET (Synchronous Optical Network) is a standardized form of protocol that is used in digital communication between the sender and the receiver. It uses a fiber optic medium to transmit a huge amount of data across a large distance. SONET helps us to transmit data over larger distances with greater data transmission rates. We have ...

Neha Kumari

Access Lists in Computer Networks

Explanation of an Access List. Access control lists (ACLs) execute message clarifying to regulate the movement of messages across a network. A message is describing supplies security by restricting traffic into a connection, limiting user and device approach to a network, and restraining traffic from going away from a network. Introduction Access-list (ACL) could be ...

Neha Kumari

DNS Spoofing | DNS Cache Poisoning

Domain Name System poisoning and spoofing are kinds of cyberattacks that use DNS server susceptibility to redirect traffic aside from permissible servers on the way to fraud. When you’ve proceeded to a defrauding page, you may be at a loss on how to resolve it — even with being the exclusive one who can. You’ll ...

Priyanshu Pandey

Difference between HTTP and HTTPS

Have you ever seen http:// or https:// in a browser’s address bar while browsing a website? Both protocols allow a web server and a web browser to exchange data related to a specific website. What distinguishes these two, though? Well, https is secure since it has an extra s in it! The very short and ...

Sushant Gaurav

Build a Chatroom in Python

A chatroom is a minimal chatting application. A chatroom is a minimal server that we can create and allow several clients to connect. All the clients that are connected to the server can transfer messages and data to one another via the central server. In this project, we will broadcast our message to every client ...

Saksham Arya

Variable Length Subnet Mask

VLSM stands for variable length subnet mask is a concept that is used to divide a network into multiple subnetworks of different lengths. Introduction to Variable Length Subnet Mask (VLSM) VLSM is a concept that is used to divide a network into multiple subnetworks of different lengths and sizes. VLSM is very commonly used in ...