Articles for category: Computer Network

Rishabh Mahajan

Difference Between Hub and Switch

Hubs and switches, both integral to networking, differ significantly in how they manage data traffic. Hubs simply broadcast data to all connected devices, leading to potential network congestion and inefficiency. In contrast, switches are smarter, forwarding data only to the specific device it’s intended for, improving network speed, and reducing unnecessary traffic. This fundamental difference ...

Saksham Arya

Hypertext Transfer Protocol (HTTP)

A web browser and a web server can “talk” to each other using the ISO Latin1 alphabet, which is ASCII with extensions for European languages, thanks to the Hypertext Transfer Protocol (HTTP), a protocol (a set of rules that describe how information is exchanged on a network). What is HTTP Protocol? Have you thought about what happens when we ...

Trapti Gupta

Types of Area Networks – LAN, MAN and WAN

Computer Network is the interconnection of multiple devices. Mainly there are three types of computer networks: LAN (Local Area Network), WAN (Wide Area Network), and MAN (Metropolitan Area Network). LAN is used to connect devices in a small area like a building, office, etc. MAN covers the devices connected within a town or a city. WAN covers a large geographical area ...

Priyanshu Pandey

Application Layer in OSI Model

In the OSI model, the application layer is the layer closest to the end-user, implying that the application layer and the end-user can interact directly with the software application. The application layer isn’t an application. Instead, it’s a component within an application that manages how data is sent to and received from other devices. It’s an abstraction ...

Snehal Jadhav

Routing Protocols in Computer Network

The Routing protocol is used to determine the path between one or more networks and store the information in the routing table. The types of Routing are static, dynamic, and default. The router is a device that is used to forward a packet from source to destination. The Routing protocol is classified as distance-vector protocol, link-state protocol, and ...

Trapti Gupta

What is Transport Layer Protocol?

In OSI suite, there are 7 layers and all layers provide different services. Today we are here with detailed information on one of the layers i.e. transport layer which provides process-to-process communication in OSI suite. Transport Layer in Computer Networks is an end-to-end layer that is used to deliver messages to a host. In OSI model, the transport layer ...

Priyanshu Pandey

Message Switching in Computer Networks

Message Switching is a connectionless network switching approach in which the complete message is routed from the sender node to the receiver node one hop at a time. It was a forerunner to packet switching. Message switching served as an adequate replacement for circuit switching before the development of packet switching. The first applications of ...

Divyanshu Soni

Simple Mail Transfer Protocol (SMTP)

SMTP (Simple Mail Transfer Protocol) protocol is the standard mechanism for “sending and receiving the electronic mails via the internet”. SMTP is a set of guidelines that enables users to exchange information. The actual mail transfer is carried out through the message transfer agent i.e. a system should have the client MTA(Mail Transfer Agent) to send mail and it should ...

Shivam Verma

What is TCP 3 Way Handshake?

TCP establishes a secure and reliable connection between two devices. This is possible because of the TCP’s 3-way handshake process, which occurs when two devices establish and close connections. There are three steps to both establishing and closing the connection, as the name implies. So, in this article, we’ll go through the TCP 3-way handshake process ...

Priyanshu Pandey

MAC Filtering in Computer Network

Most broadband routers and other wireless access points contain an optional capability known as MAC address filtering, sometimes known as hardware address filtering. It increases security by limiting the devices that can connect to a network. MAC address filtering adds an additional layer of security by comparing the device’s MAC address to a list of ...