Articles for category: Computer Network

Aman Kumar

Dynamic Trunking Protocol

Dynamic Trunking Protocol is a set of rules and properties that is used for carrying the traffic over the network when there is more than one VLAN (virtual local area network) in the network. This protocol was developed by the company named CISCO Systems. In the Dynamic Trunking Protocol, any interface can be set to ...

Trapti Gupta

Spanning Tree Protocol

Spanning Tree protocol is a link management protocol. It is used for creating a loop-free network. It is also a layer-2 protocol that runs on bridges and switches. In IEEE standard, it is standardized as IEEE 802.1D. Introduction What is STP? STP is a link management protocol and also a layer 2 protocol. STP generally ...

Priyanshu Pandey

Fragmentation in Networking

Fragmentation is a process that divides packets into smaller pieces (fragments) so that the resulting pieces can travel across a link with a smaller maximum transmission unit (MTU) than the original packet size. The network layer fragments data when the maximum size of a datagram exceeds the maximum size of data that can be retained ...

Neha Kumari

Multiple Access Protocols

Whenever a sender and receiver have a radical link to transmit data/information packets, the data link management is enough to handle the channel. Assume there is no committed path to communicate the data between 2 devices. In this case, with multiple access protocols, the channel at the same time transmits the information over the channel. ...

Trapti Gupta

Difference between Byte Stuffing and Bit Stuffing

At the receiver end the data bits stream, received from the physical layer is divided into the frames on the data link layer. Data frames can have fixed or variable length sizes. The size of every frame is different in variable framing so bit patterns are used in starting and end of the data frame. ...

Neha Kumari

Framing in Data Link Layer

Framing in the data link layer is a vital side wherever a difficulty is often highlighted to form a sense of the events. It will regulate the audience’s perception and additionally the acceptance of a specific meaning. As media plays a specific role in people’s perceptions, negative framing can produce a huge impact on individuals. ...

Trapti Gupta

Asynchronous Transfer Mode

ATM stands for Asynchronous Transfer Mode and ATM is a switching technique that uses time division multiplexing for the communication of the data. And it is a connection-oriented technology. Data is converted in the fixed and small-size cells in the ATM. Introduction to Asynchronous Transfer Mode (ATM) The full form of the ATM is Asynchronous ...

Akshay Mishra

Wake-on-LAN protocol

A computer can be awakened or turned on by a network message thanks to the Wake-on-LAN (WoL) Ethernet or token ring networking standard. Scope What Is Wake-on-LAN? Wake-on-LAN (WoL or WOL) is an Ethernet or Token Ring computer networking protocol that enables a machine to be turned on or awakened by a network message.An application ...

Neha Kumari

Routing Algorithms in Computer Networks

Routing algorithms in computer networks could be a procedure that lays down the route or path to transfer information packets from the supply to the destination. They assist in directing web traffic with efficiency. Once an information packet leaves its store, it will select among the numerous methods to reach its destination. The routing formula ...

Trapti Gupta

TCP Sequence Number and Wrap Around Concept

TCP is a connection-oriented transport layer protocol. The TCP sequence number is a 32-bit number that helps in providing a sequence number that is suitable with other transmitting bytes of the TCP connection. TCP sequence number uniquely identifies each data byte as it is a stream-oriented protocol.Using a sequence number over and again for maintaining ...