Articles for category: Computer Network

Priyanshu Pandey

Difference between HTTP and HTTPS

Have you ever seen http:// or https:// in a browser’s address bar while browsing a website? Both protocols allow a web server and a web browser to exchange data related to a specific website. What distinguishes these two, though? Well, https is secure since it has an extra s in it! The very short and ...

Sushant Gaurav

Build a Chatroom in Python

A chatroom is a minimal chatting application. A chatroom is a minimal server that we can create and allow several clients to connect. All the clients that are connected to the server can transfer messages and data to one another via the central server. In this project, we will broadcast our message to every client ...

Saksham Arya

Variable Length Subnet Mask

VLSM stands for variable length subnet mask is a concept that is used to divide a network into multiple subnetworks of different lengths. Introduction to Variable Length Subnet Mask (VLSM) VLSM is a concept that is used to divide a network into multiple subnetworks of different lengths and sizes. VLSM is very commonly used in ...

Prithvi Raj Kumar

How to Calculate Subnet Information for an IPv4 Address?

Subnetting is the practice of logically dividing a single large IPV4 subnet address network into multiple networks for better performance.A Subnet Mask is used to denote the network size in the subnetting process. In networking, there are two types of broadly used addresses available in this world. They are the IPV4 address and the IPV6 ...

Shivam Verma

LZW

LZW (Lempel–Ziv–Welch) is a universal lossless data compression technique. This compression algorithm was developed by Abraham Lempel, Jakob Ziv, and Terry Welch. In hardware implementations, the algorithm is simple and has the potential for very high throughput. It is the algorithm used in the GIF image format and is part of the widely used Unix ...

Shivam Verma

IPv4 Datagram Header

IPv4, where IP stands for Internet Protocol, and v4stands for Version Four, is used to route Internet traffic and other packet-switched layer networks, such as Ethernet. It was the first version brought into action for production on SATNET in 1982and on the ARPANET in 1983. It is a 32-bit address that is organized into four ...

Shivam Verma

Longest Prefix Match Routing

The Longest prefix match is an algorithm that IP (Internet Protocol) routers use to select a routing table entry. This algorithm is also known as the Longest Match Routing Rule. It is used by routers in Internet Protocol (IP) networking to select a routing table entry. The router determines the egress (outbound) interface and the address of ...

Aditya Saxena

Program to Calculate the Round Trip Time

Round-trip time(RTT) in networking, also called the round-trip delay time is a benchmark that measures the amount of time it takes for a data packet to be sent in addition to the amount of time it takes for acceptance of that signal to be received in milliseconds. RTT delay also includes propagation times between two ...

Priyanshu Pandey

Difference between Internet and WWW

Some people use the words “internet” and “World Wide Web” interchangeably. They believe they are the same, although this is not the case. The difference between the Internet and WWW (World Wide Web ) is essential to understand. WWW or web is one of the key services offered by the internet. The World Wide Web, ...

Aditya Saxena

Onion Routing

Onion routing is a method of communicating anonymously over a network. A data message is contained within several layers of encryption, in an onion network. This data is transferred via a sequence of network nodes known as onion routers—the onion routers "peel" away one layer, revealing the next destination of the data. Once the decryption ...