Articles for category: Computer Network

Akshay Mishra

Wake-on-LAN protocol

A computer can be awakened or turned on by a network message thanks to the Wake-on-LAN (WoL) Ethernet or token ring networking standard. Scope What Is Wake-on-LAN? Wake-on-LAN (WoL or WOL) is an Ethernet or Token Ring computer networking protocol that enables a machine to be turned on or awakened by a network message.An application ...

Neha Kumari

Routing Algorithms in Computer Networks

Routing algorithms in computer networks could be a procedure that lays down the route or path to transfer information packets from the supply to the destination. They assist in directing web traffic with efficiency. Once an information packet leaves its store, it will select among the numerous methods to reach its destination. The routing formula ...

Trapti Gupta

TCP Sequence Number and Wrap Around Concept

TCP is a connection-oriented transport layer protocol. The TCP sequence number is a 32-bit number that helps in providing a sequence number that is suitable with other transmitting bytes of the TCP connection. TCP sequence number uniquely identifies each data byte as it is a stream-oriented protocol.Using a sequence number over and again for maintaining ...

Akshay Mishra

Cellular Network

A cellular network is a radio network spread out over land in the form of cells, each of which has a base station permanently installed. Together, these cells offer broader geographic radio coverage. Therefore, even when the user equipment (UE), like a mobile phone, is moving through cells during transmission, communication is still possible. In ...

Akshay Mishra

Data Compression with Arithmetic Coding

Lossless and lossy data compression methods both employ the arithmetic coding process often. The approach uses entropy encoding, where symbols that are seen more frequently require fewer bits to encode than symbols that are seen less frequently. Compared to popular approaches like Huffman coding, it offers several benefits. You will have a thorough knowledge of ...

Priyanshu Pandey

Difference between Ping and Traceroute

In computer networks, the data between sender and receiver is transferred in small units or blocks known as packets. Each packet is transmitted separately and may take a different path to reach its destination. Once all of these packets of the original message arrive at their destination, they are reassembled to form the original message. ...

Sindhuja Gudala

Route Poisoning and Count to Infinity Problem

This article explains the Route Poisoning and Count to infinity problem which is caused by the routing loop (A network problem in which packets continue to be routed in an endless circle) in the Distance Vector Routing (DVR) network protocol. The Distance Vector Routing protocol acquires information/ packets from its neighbor routers/nodes to reach the ...

Sushant Gaurav

TCP Server-Client Implementation

The communication between different processes on the same nodes or different nodes in a network is done using the concept of a socket. A socket is a structure that allows communication between processes (of the same or different machines) i.e. sending and receiving data over a network. A socket works with the port number associated ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...

Akshay Mishra

Adding Security to Routing Protocols

The optimum route between the source and destination networks is found during the routing process by a layer 3 device (either a router or a layer 3 switch). Dynamic routing protocols are used to reduce administrator workload, i.e., administrators need to set up less, however by default, all routing information is exposed to all interested ...