Articles for category: Computer Network

Sushant Gaurav

What is WPS in Wi-Fi?

WPS stands for WiFi Protected Setup and is a network security standard whose aim is to make connections between wireless devices and a router in a fast and easy way. The Wi-Fi Protected Setup or WPS was originally known as Wi-Fi Simple Config. The WPS was built by Cisco in the year 2006. It was introduced to allow home users (who ...

Trapti Gupta

TCP Timers

Various types of timers are used by the TCP to avoid excessive delay during the transmission of the segment. Some of the TCP timers are timeout timer, time wait timer, keep alive timer, and persistent timer. Introduction Various types of TCP timers are used to make sure that excessive delay in the transmission of data ...

Shivam Verma

Network Topologies

In networking, topology is the layout of a computer network, including how its nodes are connected to one another and communicate. Topologies can be either logical or physical. Nodes in topologies usually include devices like switches, routers, and software with switch and router features. A graph is a common way to represent network topologies. In network topology ...

Akshay Mishra

Manchester Encoding

Manchester code, commonly known as phase encoding, is a line code used in communications and data storage in which each data bit is encoded either high then low, or low then high for an equal period of time. The signal is self-clocking and has no DC component. As a result, galvanically isolating electrical connections using the Manchester code is ...

Trapti Gupta

Local Area Network (LAN) Technologies

LAN is a type of network which is used to connect devices within a limited area. LAN is limited to a building, church, school, or small geographical area. Ethernet and power over the Ethernet are the most popular LAN technologies used today. Cost efficiency, Installed base, Maintainability, and Performance are factors considered while selecting the ...

Akshay Mishra

Simple Network Management Protocol

The Simple Network Management Protocol (SNMP) in computer networks is an Internet Standard protocol for gathering, organizing, and altering information about managed devices on IP networks to affect the behavior of the devices. SNMP in computer networks is commonly supported by cable modems, routers, switches, servers, workstations, printers, and other devices.For network monitoring, SNMP is ...

Priyanshu Pandey

What is a Mobile IP?

When a device is within its home network in an IP network, routing is based on static IP addresses. The IP address assigned to the device on the network connects it to the network via standard IP routing. This is similar to how a postal letter is delivered to the specified address on the envelope. ...

Trapti Gupta

Controlled Access Protocols

In controlled access protocols, communication on a shared medium is regulated to prevent data collisions. Each station consults with others to determine which has the transmission right, allowing only one node to send data at a time. This method ensures efficient data transfer without conflicts. The three primary controlled access techniques are Reservation, Polling, and ...

Priyanshu Pandey

Access Control List

Access Control Lists (ACLs) are a collection of permit-and-deny restrictions, also known as rules, that offer security by preventing unauthorized users from accessing particular resources and granting authorized users access. Additionally, ACLs can govern traffic flow, limit the information in routing updates, and determine which types of traffic are sent or denied. ACLs often sit ...

Mansi

How Does Bluetooth Work?

What is Bluetooth ? It is a technology that uses low-power, short-range communication technology that is used for connecting and sharing data between two or more devices electronically. It is used in a wide variety of applications like headphones, phones, etc. How Does Bluetooth Work ? How does Bluetooth work inside a device ? The ...