Articles for category: Computer Network

Priyanshu Pandey

What is a Mobile IP?

When a device is within its home network in an IP network, routing is based on static IP addresses. The IP address assigned to the device on the network connects it to the network via standard IP routing. This is similar to how a postal letter is delivered to the specified address on the envelope. ...

Trapti Gupta

Controlled Access Protocols

In controlled access protocols, communication on a shared medium is regulated to prevent data collisions. Each station consults with others to determine which has the transmission right, allowing only one node to send data at a time. This method ensures efficient data transfer without conflicts. The three primary controlled access techniques are Reservation, Polling, and ...

Priyanshu Pandey

Access Control List

Access Control Lists (ACLs) are a collection of permit-and-deny restrictions, also known as rules, that offer security by preventing unauthorized users from accessing particular resources and granting authorized users access. Additionally, ACLs can govern traffic flow, limit the information in routing updates, and determine which types of traffic are sent or denied. ACLs often sit ...

Mansi

How Does Bluetooth Work?

What is Bluetooth ? It is a technology that uses low-power, short-range communication technology that is used for connecting and sharing data between two or more devices electronically. It is used in a wide variety of applications like headphones, phones, etc. How Does Bluetooth Work ? How does Bluetooth work inside a device ? The ...

Aditya Saxena

WebSocket

A WebSocket is a full-duplex and bidirectional protocol used in the client-server communication channels. A WebSocket address starts with wss:// or ws://. It is a stateful protocol, implying that the connection between the server and the client is kept alive until either client or server terminates it. After closing the connection by either the server ...

Trapti Gupta

Challenge Response Authentication Mechanism

CRAM stands for Challenge Response Authentication Mechanism and it is a set of protocols used for authenticating a user by giving them a challenge and access is provided to the user only if they answer the challenges correctly.CAPTCHA is one example of Challenge Response Authentication. Introduction The Challenge Response Authentication mechanism is abbreviated as CRAM ...

Trapti Gupta

Active Directory Domain Services

An active directory is used for the management of computers and other devices on a network. Active Directory is a directory service that runs on Microsoft Windows Server. It is used for identification and also provides access management. Active Directory Domain Services (AD DS) is the most important component of Active Directory. The hierarchal structure ...

Neha Kumari

What is Traceroute?

Traceroute is the most preferred tool that network engineers make use of to troubleshoot networks. It was innovated in 1987 and remains extremely relevant these days. Traceroute may be a widely handed-down command-line benefit accessible in nearly all operating systems. It manifests you the entire route to a goal address. It also manifests the time ...

Trapti Gupta

Carrier Sense Multiple Access

In Carrier Sense Multiple Access (CSMA) protocol, the station will sense the channel before the transmission of data. CSMA reduces the chances of collision in the network but it does not eliminate the collision from the channel. 1-Persistent, Non-Persistent, P-Persistent, and O-Persistent are the three access methods of CSMA. What is Carrier Sense Multiple Access ...

Aman Kumar

Dynamic Trunking Protocol

Dynamic Trunking Protocol is a set of rules and properties that is used for carrying the traffic over the network when there is more than one VLAN (virtual local area network) in the network. This protocol was developed by the company named CISCO Systems. In the Dynamic Trunking Protocol, any interface can be set to ...