Articles for category: Computer Network

Piyush Singhal

File Transfer Protocol (FTP)

What is File Transfer Protocol (FTP)? How Does File Transfer Protocol (FTP) Work? FTP can be accessed via a basic command-line interface (from a console or terminal window in Microsoft Windows, Apple macOS, or Linux) or with a dedicated graphical user interface. FTP clients can also be used with web browsers. What is the Purpose of ...

Mansi

TCP Flow Control

Today, the world is connected to the Internet and billions of data are being shared through a wireless network. All of these are done using TCP/IP protocol which uses a three-way handshake and flow control to initiate, terminate the connection, and send and receive data packets. Flow control is an important concept in Computer Networks as it provides reliable ...

Trapti Gupta

Socket Programming in Computer Network

Sockets in computer networks are used for allowing the transmission of information between two processes of the same machines or different machines in the network. The socket is the combination of IP address and software port number used for communication between multiple processes. Socket helps to recognize the address of the application to which data is to be sent using ...

Sushant Gaurav

IEEE Standards in Computer Networks

IEEE stands for Institute of Electrical and Electronics Engineers. The main AIM of IEEE is to foster technological innovation and excellence for the benefit of humanity. The IEEE standards in computer networks ensure communication between various devices; it also helps to make sure that the network service, i.e., the Internet and its related technologies, must follow a set of ...

Ganesh Medewar

Cyclic Redundancy Check

The cyclic redundancy check (CRC) is widely used as a data transmission error detection tool in the field of data communication, mostly used in digital networks and storage devices. The data sent by the sender side is sent to the receiver by appending a small check code in the data stream. This check code is generated using ...

Trapti Gupta

What is Checksum?

We are here with one of the techniques used in data transmission for detecting an error. The name of that error detection algorithm is Checksum. It is essential to perform error detection in data transmission. The Checksum is an error detection technique that detects an error in a transmitted message by appending redundant bits in the message. So this ...

Sushant Gaurav

Transmission Control Protocol (TCP)

The transmission control protocol is a transport layer connection-oriented protocol that defines the standard of establishing and maintaining the conversation that will be used by the applications to exchange the data. The transmission control protocol is one of the most important and widely used protocols of the IP suite. The TCP ensures the reliable transmission and delivery of our ...

Manish Jha

World Wide Web (WWW)

The World Wide Web (popularly known as the WWW) is a troupe of web pages or websites that is stored within the web servers. This is a collection of web pages or websites connected to local computer systems with the help of the internet. The World Wide web is used to connect people through images, text pages, videos, digital content, ...

Sushant Gaurav

Difference between Transport Layer and Network Layer

The network layer and transport layer are two of the seven layers of the OSI model. The network layer is the third layer of the OSI model which provides communication between hosts of different networks. The transport layer is the fourth layer of the OSI model which is responsible for the process to process delivery of ...

Trapti Gupta

Stop and Wait Protocol

To maintain the rate of data transmission between sender and receiver, it is required to use flow control protocol. The data link layer provides us with the protocol for controlling the data transmission rate. So here we are going to discuss one of the flow control protocols named stop and wait protocol. The stop-and-wait protocol ...