Articles for category: Computer Network

Priyanshu Pandey

Access Control List

Access Control Lists (ACLs) are a collection of permit-and-deny restrictions, also known as rules, that offer security by preventing unauthorized users from accessing particular resources and granting authorized users access. Additionally, ACLs can govern traffic flow, limit the information in routing updates, and determine which types of traffic are sent or denied. ACLs often sit ...

Mansi

How Does Bluetooth Work?

What is Bluetooth ? It is a technology that uses low-power, short-range communication technology that is used for connecting and sharing data between two or more devices electronically. It is used in a wide variety of applications like headphones, phones, etc. How Does Bluetooth Work ? How does Bluetooth work inside a device ? The ...

Aditya Saxena

WebSocket

A WebSocket is a full-duplex and bidirectional protocol used in the client-server communication channels. A WebSocket address starts with wss:// or ws://. It is a stateful protocol, implying that the connection between the server and the client is kept alive until either client or server terminates it. After closing the connection by either the server ...

Priyanshu Pandey

ALOHA in Computer Network

The term Aloha in computer network means hello. Aloha is a data-link layer multiple access protocols that describes how multiple terminals can access the medium without interfering or conflicting. Norman Abramson and his associates developed it in the 1970s at the University of Hawaii. Each node or station in ALOHA transmits a frame without attempting ...

Trapti Gupta

Internet Protocol Version 6 Header Format

IPv6 boasts a concise header despite its address being quadruple the size of IPv4. Its header structure consists of a Fixed Header containing vital routing data, and potentially, Extension Headers for additional packet details. This design ensures efficiency and complexity improvements over IPv4. IPv6’s innovative approach enhances internet protocol capabilities, maintaining essential routing information while ...

Trapti Gupta

Active Directory Domain Services

An active directory is used for the management of computers and other devices on a network. Active Directory is a directory service that runs on Microsoft Windows Server. It is used for identification and also provides access management. Active Directory Domain Services (AD DS) is the most important component of Active Directory. The hierarchal structure ...

Neha Kumari

What is Traceroute?

Traceroute is the most preferred tool that network engineers make use of to troubleshoot networks. It was innovated in 1987 and remains extremely relevant these days. Traceroute may be a widely handed-down command-line benefit accessible in nearly all operating systems. It manifests you the entire route to a goal address. It also manifests the time ...

Trapti Gupta

Carrier Sense Multiple Access

In Carrier Sense Multiple Access (CSMA) protocol, the station will sense the channel before the transmission of data. CSMA reduces the chances of collision in the network but it does not eliminate the collision from the channel. 1-Persistent, Non-Persistent, P-Persistent, and O-Persistent are the three access methods of CSMA. What is Carrier Sense Multiple Access ...

Aman Kumar

Dynamic Trunking Protocol

Dynamic Trunking Protocol is a set of rules and properties that is used for carrying the traffic over the network when there is more than one VLAN (virtual local area network) in the network. This protocol was developed by the company named CISCO Systems. In the Dynamic Trunking Protocol, any interface can be set to ...

Shivam Verma

Types of Ports in Switches

The switches are a crucial element of networking hardware used in Ethernet networks to ensure device connectivity. It is considered a network’s brain since it effectively connects devices using hardware addresses. Due to their increasing importance, switches are now manufactured in various configurations and specifications. A switch contains numerous ports where computers can be connected. ...