Articles for category: Computer Network

Trapti Gupta

Authentication, Authorization, and Accounting

AAA (Authentication, Authorization, and Accounting) is a framework that allows access to network resources. User identification is the process of authentication and then what resources access is allowed to the user is decided by the authorization. Accounting is used to determine the usage of network resources. Introduction to AAA AAA stands for Authentication, Authorization, and ...

Priyanshu Pandey

Differences Between Virtual Circuits & Datagram Networks

Virtual Circuits are also known as connection-oriented switching. Virtual circuit switching establishes a predetermined path before messages are sent. In contrast, a datagram is a packet-switching technique in which each packet, known as a datagram, is treated as a separate entity. Each packet carries destination information, which the switch uses to route the packet to ...

Akshay Mishra

Telnet in Computer Networks

TELNET is an acronym for TErminaL-NETwork. It is a form of protocol that makes it possible for one computer to connect to a nearby computer. It is employed as a common TCP/IP protocol for the virtual terminal service provided by ISO. The local computer is the one that establishes the connection. A remote computer is ...

Aditya Saxena

Program for IP Forwarding Table Lookup

There exists a routing table in the Unix operating system consisting of several tuples that contain the I.P. (Internet Protocol) address of the network, the subnet mask, the IP address of the gateway, and the name of the interface. This information is required for forwarding packets to the exterior of the network for connecting to ...

Trapti Gupta

Multiplexing and Demultiplexing in Computer Networks

The process of multiplexing involves selecting an input line from the ‘n’ input lines and transmitting that selected line to the output line. The multiplexer is a device used for performing multiplexing. The demultiplexer is used for demultiplexing. And the demultiplexing process is just the reverse of the multiplexing process. Multiplexers and Demultiplexers are abbreviated ...

Aditya Saxena

Program to Calculate the Round Trip Time

Round-trip time(RTT) in networking, also called the round-trip delay time is a benchmark that measures the amount of time it takes for a data packet to be sent in addition to the amount of time it takes for acceptance of that signal to be received in milliseconds. RTT delay also includes propagation times between two ...

Trapti Gupta

Error Detection and Correction in Computer Networks

Errors are introduced into the binary data transmitted from the sender to the receiver due to noise during transmission. The error can be a single-bit error, multi-bit error, or burst error. Error detection methods are used to check whether the receiver has received correct data or corrupted data. And error correction is used to correct ...

Priyanshu Pandey

Mobile Ad hoc Network

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a type of wireless network that is decentralized. Since it doesn’t rely on a pre-existing infrastructure, like routers in wired networks or access points in wireless networks, the network is ad hoc. Instead, each node takes part in routing by sending data ...

Akshay Mishra

Dynamic Host Configuration Protocol

Automatic distribution and assignment of IP addresses, default gateways, and other network characteristics to client devices are performed by a DHCP server, a type of network server. For clients to successfully communicate on the network, a DHCP server automatically delivers the necessary network parameters. Without it, the network administrator must manually configure each new client ...

Neha Kumari

Access Lists in Computer Networks

Explanation of an Access List. Access control lists (ACLs) execute message clarifying to regulate the movement of messages across a network. A message is describing supplies security by restricting traffic into a connection, limiting user and device approach to a network, and restraining traffic from going away from a network. Introduction Access-list (ACL) could be ...