Articles for category: Computer Network

Piyush Singhal

File Transfer Protocol (FTP)

What is File Transfer Protocol (FTP)? How Does File Transfer Protocol (FTP) Work? FTP can be accessed via a basic command-line interface (from a console or terminal window in Microsoft Windows, Apple macOS, or Linux) or with a dedicated graphical user interface. FTP clients can also be used with web browsers. What is the Purpose of ...

Mansi

TCP Flow Control

Today, the world is connected to the Internet and billions of data are being shared through a wireless network. All of these are done using TCP/IP protocol which uses a three-way handshake and flow control to initiate, terminate the connection, and send and receive data packets. Flow control is an important concept in Computer Networks as it provides reliable ...

Trapti Gupta

Socket Programming in Computer Network

Sockets in computer networks are used for allowing the transmission of information between two processes of the same machines or different machines in the network. The socket is the combination of IP address and software port number used for communication between multiple processes. Socket helps to recognize the address of the application to which data is to be sent using ...

Shivam Verma

What is localhost?

The hostname of the current server or system accessing the network is referred to as Localhost in networking. The network services running on the host are accessed using it through the loopback network interface. The loopback interface provides a way to connect back to the server while avoiding any local network interface hardware. The term ...

Shivam Verma

Token Bus (IEEE 802.4)

Token bus is a popular standard for token passing LANs. It was standardized by IEEE standard 802.4 and is mainly used for industrial applications. In a token bus LAN, stations are used to create a virtual ring, and tokens are then passed from one station to another using this virtual ring. Every station or node ...

Shivam Verma

Access Control in Networking

Access control is a data security method that allows organizations to manage who has access to their resources and data. Secure access control uses policies that ensure users are who they claim they are and are provided with the appropriate levels of access control. Along with providing access control features, Network access control (NAC) also covers ...

Priyanshu Pandey

Routing Information Protocol (RIP)

The RIP (Routing Information Protocol) is a distance-vector routing protocol. Routers that use the distance-vector protocol send all or a portion of their routing tables to their neighbors in routing-update messages. The Routing Information Protocol employs a distance vector algorithm to determine which path a packet should take to reach its destination. Each RIP router maintains its ...

Akshay Mishra

Digital Signature in Computer Network

Digital signatures allow us to verify the author, date, and time of signatures and authenticate the message contents. To verify the integrity and validity of digital messages and documents, it employs a cutting-edge mathematical technique. It helps us combat the issue of impersonation and tampering in digital communications and ensures that the contents of a message are ...

Priyanshu Pandey

TCP/IP Protocol Suite

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols that makes data exchange between two devices possible. TCP/IP specifies how data should be packetized, addressed, transmitted, routed, and received on a network by providing end-to-end communication. As compared to the OSI model, which is a theoretical model, TCP/IP is an application and practical ...

Himanshu Yadav

IPv6 Address

A device on the internet or a local network can be identified by its IP address, which is a special address. An endpoint device in an IPv6 network is identified by an IPv6 address, which is a 128-bit alphanumeric value. It offers Efficient Routing as well as a sufficient quantity of unique IP addresses. What is ...