Articles for category: Computer Network

Aditya Saxena

Collision Avoidance in Wireless Networks

In computer networking, a collision happens when multiple devices attempt to transfer data via a commonly shared circuit. In a common circuit, various devices may listen at the same time, but only one device at a time is allowed to transmit data. This requires that all other devices listen to the transmission. Many devices are ...

Aditya Saxena

Throughput in Computer Networks

Throughput in computer networking is the rate of successful transmission of messages over a channel of communication, such as packet radio, Ethernet, etc. The data contained in these messages may be delivered through network nodes, or over logical or physical links. Throughput is mostly measured in B.P.S. (Bits Per Second). The throughput of a network ...

Sushant Gaurav

Coaxial Cable in Computer Networks

An electrical cable with copper as a conductor material, a shielding of insulator material, and a braided mesh metal is known as a coaxial cable in computer networks. A coaxial cable is also known as a coax. The coaxial cable supports high-speed signal transfer over a larger distance as compared to other cables like twisted ...

Saksham Arya

HTTP Non-Persistent & Persistent Connection

HTTP (Hypertext Transfer Protocol) is an application layer protocol that is used to establish a connection between a client and a server so that the client can transfer data to the server and vice versa. HTTP is divided into two categories i.e. Non-Persistent connection HTTP and Persistent connection HTTP. In this article, we will discuss ...

Trapti Gupta

Authentication, Authorization, and Accounting

AAA (Authentication, Authorization, and Accounting) is a framework that allows access to network resources. User identification is the process of authentication and then what resources access is allowed to the user is decided by the authorization. Accounting is used to determine the usage of network resources. Introduction to AAA AAA stands for Authentication, Authorization, and ...

Prithvi Raj Kumar

How to Calculate Subnet Information for an IPv4 Address?

Subnetting is the practice of logically dividing a single large IPV4 subnet address network into multiple networks for better performance.A Subnet Mask is used to denote the network size in the subnetting process. In networking, there are two types of broadly used addresses available in this world. They are the IPV4 address and the IPV6 ...

Shivam Verma

LZW

LZW (Lempel–Ziv–Welch) is a universal lossless data compression technique. This compression algorithm was developed by Abraham Lempel, Jakob Ziv, and Terry Welch. In hardware implementations, the algorithm is simple and has the potential for very high throughput. It is the algorithm used in the GIF image format and is part of the widely used Unix ...

Shivam Verma

IPv4 Datagram Header

IPv4, where IP stands for Internet Protocol, and v4stands for Version Four, is used to route Internet traffic and other packet-switched layer networks, such as Ethernet. It was the first version brought into action for production on SATNET in 1982and on the ARPANET in 1983. It is a 32-bit address that is organized into four ...

Shivam Verma

Longest Prefix Match Routing

The Longest prefix match is an algorithm that IP (Internet Protocol) routers use to select a routing table entry. This algorithm is also known as the Longest Match Routing Rule. It is used by routers in Internet Protocol (IP) networking to select a routing table entry. The router determines the egress (outbound) interface and the address of ...

Aditya Saxena

Program to Calculate the Round Trip Time

Round-trip time(RTT) in networking, also called the round-trip delay time is a benchmark that measures the amount of time it takes for a data packet to be sent in addition to the amount of time it takes for acceptance of that signal to be received in milliseconds. RTT delay also includes propagation times between two ...