Articles for category: Computer Network

Shivam Verma

What is Bandwidth in Computer Network?

Bandwidth, or network bandwidth, is the maximum data transfer rate of a network or Internet connection. It determines how much information can be sent over a particular connection in a certain amount of time. The higher bandwidth of a network, the larger amount of data it can send to and from across its path. Be careful ...

Sushant Gaurav

Difference between Peer to Peer and Client Server

There are mainly two types of computer network architecture: peer-to-peer network architecture or P2P network architecture and Client-Server network architecture. Peer-to-peer has decentralized the simplest form of network architecture where every computer system can communicate with every other computer system. In the peer-to-peer network, each node of the network has equal permission and responsibility for processing the data or ...

Hinal Vithlani

Layers of OSI Model

The OSI model stands for Open Systems Interconnection model. The OSI model is also known as the ISO-OSI model as it was developed by ISO (International Organization for Standardization). It is a conceptual reference model that describes the entire flow of information from one computer to the other computer. The OSI model is a 7-layered model, so it ...

Akshay Mishra

Integrated Services Digital Network (ISDN)

Integrated Services Digital Network (ISDN) comprises communication standards facilitating the concurrent digital transmission of voice, video, and data over traditional public switched telephone network circuits. Unlike its predecessor, which primarily transmitted voice, ISDN’s innovation lies in integrating speech and data on the same lines, a capability absent in traditional telephone systems. Operating as a circuit-switched ...

Neha Kumari

Hot Spot 2.0

Hotspot 2.0 (HS2), also known as Passpoint” or “Next Generation Hotspot, represents a significant evolution in public Wi-Fi access. This innovative standard, driven by the Wi-Fi Alliance and endorsed by the Wireless Broadband Alliance, simplifies and secures the process of connecting to public wireless hotspots. It’s built on the IEEE 802.11u standard, enhancing how devices discover and securely connect to network ...

Saksham Arya

How Does the Internet Work?

An internet is a huge network of networks that helps us to connect millions of computers together. These computers that are connected to each other through the internet can interact with each other over the internet. The Internet operates on a technique called packet switching. In packet switching, the data that is transferred among the different computers ...

Priyanshu Pandey

What is Firewall in Computer Network ?

A firewall can be hardware or software that controls a device’s secure in-flow and out-flow of data. It monitors network traffic and serves as a firewall between trusted and untrusted networks. Firewalls, particularly Next-Generation Firewalls, are designed to protect against malware and application-layer attacks. When you use a firewall as part of your security infrastructure, you configure your network with specific ...

Shivam Verma

What is localhost?

The hostname of the current server or system accessing the network is referred to as Localhost in networking. The network services running on the host are accessed using it through the loopback network interface. The loopback interface provides a way to connect back to the server while avoiding any local network interface hardware. The term ...

Shivam Verma

Token Bus (IEEE 802.4)

Token bus is a popular standard for token passing LANs. It was standardized by IEEE standard 802.4 and is mainly used for industrial applications. In a token bus LAN, stations are used to create a virtual ring, and tokens are then passed from one station to another using this virtual ring. Every station or node ...

Shivam Verma

Access Control in Networking

Access control is a data security method that allows organizations to manage who has access to their resources and data. Secure access control uses policies that ensure users are who they claim they are and are provided with the appropriate levels of access control. Along with providing access control features, Network access control (NAC) also covers ...