Articles for category: Computer Network

Aditya Saxena

WebSocket

A WebSocket is a full-duplex and bidirectional protocol used in the client-server communication channels. A WebSocket address starts with wss:// or ws://. It is a stateful protocol, implying that the connection between the server and the client is kept alive until either client or server terminates it. After closing the connection by either the server ...

Priyanshu Pandey

ALOHA in Computer Network

The term Aloha in computer network means hello. Aloha is a data-link layer multiple access protocols that describes how multiple terminals can access the medium without interfering or conflicting. Norman Abramson and his associates developed it in the 1970s at the University of Hawaii. Each node or station in ALOHA transmits a frame without attempting ...

Trapti Gupta

Internet Protocol Version 6 Header Format

IPv6 boasts a concise header despite its address being quadruple the size of IPv4. Its header structure consists of a Fixed Header containing vital routing data, and potentially, Extension Headers for additional packet details. This design ensures efficiency and complexity improvements over IPv4. IPv6’s innovative approach enhances internet protocol capabilities, maintaining essential routing information while ...

Neha Kumari

Router on a Stick

Router-on-a-stick (ROAS) could be an approach to link a router with one individual physical link to handle and execute IP routing among VLANs. Through the switch’s outlook, A physical link is drawn as a trunk port permitting all VLANs that proceed to be routed. Coming from the router’s viewpoint, another physical intersection is constituted as numerous effective sub-alliances, ...

Sushant Gaurav

What is WPS in Wi-Fi?

WPS stands for WiFi Protected Setup and is a network security standard whose aim is to make connections between wireless devices and a router in a fast and easy way. The Wi-Fi Protected Setup or WPS was originally known as Wi-Fi Simple Config. The WPS was built by Cisco in the year 2006. It was introduced to allow home users (who ...

Aman Kumar

Dynamic Trunking Protocol

Dynamic Trunking Protocol is a set of rules and properties that is used for carrying the traffic over the network when there is more than one VLAN (virtual local area network) in the network. This protocol was developed by the company named CISCO Systems. In the Dynamic Trunking Protocol, any interface can be set to ...

Shivam Verma

Types of Ports in Switches

The switches are a crucial element of networking hardware used in Ethernet networks to ensure device connectivity. It is considered a network’s brain since it effectively connects devices using hardware addresses. Due to their increasing importance, switches are now manufactured in various configurations and specifications. A switch contains numerous ports where computers can be connected. ...

Trapti Gupta

Challenge Response Authentication Mechanism

CRAM stands for Challenge Response Authentication Mechanism and it is a set of protocols used for authenticating a user by giving them a challenge and access is provided to the user only if they answer the challenges correctly.CAPTCHA is one example of Challenge Response Authentication. Introduction The Challenge Response Authentication mechanism is abbreviated as CRAM ...

Trapti Gupta

Active Directory Domain Services

An active directory is used for the management of computers and other devices on a network. Active Directory is a directory service that runs on Microsoft Windows Server. It is used for identification and also provides access management. Active Directory Domain Services (AD DS) is the most important component of Active Directory. The hierarchal structure ...

Neha Kumari

What is Traceroute?

Traceroute is the most preferred tool that network engineers make use of to troubleshoot networks. It was innovated in 1987 and remains extremely relevant these days. Traceroute may be a widely handed-down command-line benefit accessible in nearly all operating systems. It manifests you the entire route to a goal address. It also manifests the time ...