Articles for category: Computer Network

Priyanshu Pandey

Difference between Ping and Traceroute

In computer networks, the data between sender and receiver is transferred in small units or blocks known as packets. Each packet is transmitted separately and may take a different path to reach its destination. Once all of these packets of the original message arrive at their destination, they are reassembled to form the original message. ...

Sindhuja Gudala

Route Poisoning and Count to Infinity Problem

This article explains the Route Poisoning and Count to infinity problem which is caused by the routing loop (A network problem in which packets continue to be routed in an endless circle) in the Distance Vector Routing (DVR) network protocol. The Distance Vector Routing protocol acquires information/ packets from its neighbor routers/nodes to reach the ...

Sushant Gaurav

TCP Server-Client Implementation

The communication between different processes on the same nodes or different nodes in a network is done using the concept of a socket. A socket is a structure that allows communication between processes (of the same or different machines) i.e. sending and receiving data over a network. A socket works with the port number associated ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...

Akshay Mishra

Adding Security to Routing Protocols

The optimum route between the source and destination networks is found during the routing process by a layer 3 device (either a router or a layer 3 switch). Dynamic routing protocols are used to reduce administrator workload, i.e., administrators need to set up less, however by default, all routing information is exposed to all interested ...

Trapti Gupta

Context-based Access Control

Context Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall and filtering of traffic is performed by it at the different OSI model layers. Traffic Filtering, Traffic Examine, Intrusion Prevention, and alert and audit traits are done by the CBAC. Introduction Context Based ...

Gaurav Kr Roy

Types of Network Topologies

Networking has become an essential component of cybersecurity & all of the daily activities we perform while communicating with the internet. Any communication network our phone or system lies in follows or comes under a structure called the topology. This article will discuss network topologies, their types, and troubleshooting topologies with software. What is Network ...

Neha Kumari

TACACS+

Terminal Access Controller Access-Control System (TACACS) refers to a family of connected protocols handling remote authentication and connected services for network access management through a centralized server. The initial TACACS protocol, which dates back to 1984, was utilized for communicating with an authentication server, common in older UNIX networks or other operating systems as well ...

Sindhuja Gudala

Packet Flow in the Same Network

For transferring a packet from the source host to the destination host in the network we require both the MAC and IP address of the destination host. ARP (Address Resolution Protocol) is a protocol from the second layer i.e, the Data link layer in the OSI model that connects a dynamic Internet Protocol (IP) address ...

Sushant Gaurav

Frequency Division and Time Division Multiplexing

The signal transmission over various channels can be performed in two different ways namely – Frequency division and Time division multiplexing. In frequency division multiplexing, we transfer many signals at the same time and each source transmits its signals in its allocated range of frequency. In the time division multiplexing, the transmission time is divided ...