Articles for category: Computer Network

Shivam Verma

Types of Ports in Switches

The switches are a crucial element of networking hardware used in Ethernet networks to ensure device connectivity. It is considered a network’s brain since it effectively connects devices using hardware addresses. Due to their increasing importance, switches are now manufactured in various configurations and specifications. A switch contains numerous ports where computers can be connected. ...

Akshay Mishra

Wake-on-LAN protocol

A computer can be awakened or turned on by a network message thanks to the Wake-on-LAN (WoL) Ethernet or token ring networking standard. Scope What Is Wake-on-LAN? Wake-on-LAN (WoL or WOL) is an Ethernet or Token Ring computer networking protocol that enables a machine to be turned on or awakened by a network message.An application ...

Neha Kumari

Routing Algorithms in Computer Networks

Routing algorithms in computer networks could be a procedure that lays down the route or path to transfer information packets from the supply to the destination. They assist in directing web traffic with efficiency. Once an information packet leaves its store, it will select among the numerous methods to reach its destination. The routing formula ...

Trapti Gupta

TCP Sequence Number and Wrap Around Concept

TCP is a connection-oriented transport layer protocol. The TCP sequence number is a 32-bit number that helps in providing a sequence number that is suitable with other transmitting bytes of the TCP connection. TCP sequence number uniquely identifies each data byte as it is a stream-oriented protocol.Using a sequence number over and again for maintaining ...

Akshay Mishra

Cellular Network

A cellular network is a radio network spread out over land in the form of cells, each of which has a base station permanently installed. Together, these cells offer broader geographic radio coverage. Therefore, even when the user equipment (UE), like a mobile phone, is moving through cells during transmission, communication is still possible. In ...

Akshay Mishra

Data Compression with Arithmetic Coding

Lossless and lossy data compression methods both employ the arithmetic coding process often. The approach uses entropy encoding, where symbols that are seen more frequently require fewer bits to encode than symbols that are seen less frequently. Compared to popular approaches like Huffman coding, it offers several benefits. You will have a thorough knowledge of ...

Akshay Mishra

Service Set Identifier

A service set identifier’s main purpose is to distinguish one wireless local area network from another that might be simultaneously broadcasting in the same area. A basic service set (BSS), a network of connected clients and access points, and an extended service set cooperate with a service set identification.A basic service set is a subset ...

Saksham Arya

Difference between HTTP and FTP

HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) are the two internet protocols that are used to transfer data between a client and a server. Both of these protocols operate on the Application Layer of the OSI model. We also have a separate article OSI-Model where you can read about the OSI Model and ...

Priyanshu Pandey

Virtual LAN

A VLAN or Virtual Local Area Network is a customized network built from one or more local area networks. It allows a group of devices from different networks to be integrated into a single logical network. As a result, a virtual LAN is created that can be managed just like a physical LAN. Without VLANs, ...

Trapti Gupta

Spanning Tree Protocol

Spanning Tree protocol is a link management protocol. It is used for creating a loop-free network. It is also a layer-2 protocol that runs on bridges and switches. In IEEE standard, it is standardized as IEEE 802.1D. Introduction What is STP? STP is a link management protocol and also a layer 2 protocol. STP generally ...