Articles for category: Computer Network

Akshay Mishra

Token Ring Protocol

A communication protocol used in local area networks is called the Token Ring protocol (LAN). The topology of the network determines the sequence in which stations send in a token ring protocol. A single ring of connections connects all of the stations. It makes use of a unique three-byte frame known as a “token” that ...

Priyanshu Pandey

Difference between HTML and HTTP

HTML (Hyper Text Markup Language) and HTTP (Hypertext Transfer Protocol) are two completely distinct technologies. HTTP is an application protocol that governs how information travels on the World Wide Web, whereas HTML governs how Web pages are formatted and displayed. HTTP protocol determines how Web data is moved around the internet, whereas HTML is the ...

Trapti Gupta

Distance Vector Routing v/s Link State Routing

Routing is the process of choosing the path in the network. Distance vector routing is the routing protocol that selects the path based on parameter distance. Link State routing protocol is the protocol that chooses the best path based on the cost of the path. Introduction to Routing Routing decides the best path for the ...

Sushant Gaurav

P2P(Peer To Peer) File Sharing

Peer-to-peer has decentralized the simplest form of network architecture where every computer system can communicate with every other computer system. In the peer-to-peer network, each node of the network has equal permission and responsibility for processing the data or information. Each computer network in the peer-to-peer computer network architecture acts as an independent workstation and ...

Agam Jyot Singh

Hot Standby Router Protocol

The Hot Standby Router Protocol (HSRP) makes sure that when access circuits or network edge devices have first-hop failures, user traffic is instantly and transparently restored. With HSRP, you can set up two or more routers as standby routers and just one router as active at once. The Hot Standby Router Protocol (HSRP) allows devices ...

Priyanshu Pandey

Difference between Ping and Traceroute

In computer networks, the data between sender and receiver is transferred in small units or blocks known as packets. Each packet is transmitted separately and may take a different path to reach its destination. Once all of these packets of the original message arrive at their destination, they are reassembled to form the original message. ...

Sindhuja Gudala

Route Poisoning and Count to Infinity Problem

This article explains the Route Poisoning and Count to infinity problem which is caused by the routing loop (A network problem in which packets continue to be routed in an endless circle) in the Distance Vector Routing (DVR) network protocol. The Distance Vector Routing protocol acquires information/ packets from its neighbor routers/nodes to reach the ...

Sushant Gaurav

TCP Server-Client Implementation

The communication between different processes on the same nodes or different nodes in a network is done using the concept of a socket. A socket is a structure that allows communication between processes (of the same or different machines) i.e. sending and receiving data over a network. A socket works with the port number associated ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...