Articles for category: Computer Network

Akshay Mishra

Shannon-Fano Algorithm for Data Compression

Lossless compression and lossy compression are two methods that can be used. In contrast to lossless compression, which preserves all data, lossy compression shrinks the size of the data by deleting extraneous information.For lossless data compression of multimedia, the Shannon-Fano Algorithm is an entropy encoding method. It gives each symbol a code depending on how ...

Akshay Mishra

Routed Protocols vs Routing Protocols

A routed protocol allows for data routing. IP and AppleTalk are two examples of routed protocols. An addressing method is necessary for such a protocol. You may determine the network that a host belongs to as well as where that host is located on that network by using the addressing scheme. A routed protocol can ...

Sushant Gaurav

Sliding Window Protocol

The sliding window protocol is a data link layer protocol that is useful in the sequential and reliable delivery of the data frames. Using the sliding window protocol, the sender can send multiple frames at a time. The sliding window protocol uses a mechanism of sequence numbers. The sender associates a sequence number to the ...

Priyanshu Pandey

Multiplexing in Computer Networks

Multiplexing is a technique that allows different analog and digital transmission streams to be handled at the same time across a shared link. Multiplexing converts a high-capacity medium into a low-capacity logical medium, subsequently shared by multiple streams. The process of combining data streams or input is called Multiplexing, and the hardware used for multiplexing ...

Mansi

Congestion Control

TCP congestion window and congestion policy are used to avoid network congestion. As the network is the main component in wireless communication, any congestion in a network must be avoided. If the data sent by the sender is not delivered by the network, it must inform the sender about it. The network, other than the ...

Priyanshu Pandey

Mobile Ad hoc Network

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a type of wireless network that is decentralized. Since it doesn’t rely on a pre-existing infrastructure, like routers in wired networks or access points in wireless networks, the network is ad hoc. Instead, each node takes part in routing by sending data ...

Akshay Mishra

Dynamic Host Configuration Protocol

Automatic distribution and assignment of IP addresses, default gateways, and other network characteristics to client devices are performed by a DHCP server, a type of network server. For clients to successfully communicate on the network, a DHCP server automatically delivers the necessary network parameters. Without it, the network administrator must manually configure each new client ...

Neha Kumari

Access Lists in Computer Networks

Explanation of an Access List. Access control lists (ACLs) execute message clarifying to regulate the movement of messages across a network. A message is describing supplies security by restricting traffic into a connection, limiting user and device approach to a network, and restraining traffic from going away from a network. Introduction Access-list (ACL) could be ...

Neha Kumari

DNS Spoofing | DNS Cache Poisoning

Domain Name System poisoning and spoofing are kinds of cyberattacks that use DNS server susceptibility to redirect traffic aside from permissible servers on the way to fraud. When you’ve proceeded to a defrauding page, you may be at a loss on how to resolve it — even with being the exclusive one who can. You’ll ...

Priyanshu Pandey

Difference between HTTP and HTTPS

Have you ever seen http:// or https:// in a browser’s address bar while browsing a website? Both protocols allow a web server and a web browser to exchange data related to a specific website. What distinguishes these two, though? Well, https is secure since it has an extra s in it! The very short and ...