Articles for category: Computer Network

Trapti Gupta

Distance Vector Routing v/s Link State Routing

Routing is the process of choosing the path in the network. Distance vector routing is the routing protocol that selects the path based on parameter distance. Link State routing protocol is the protocol that chooses the best path based on the cost of the path. Introduction to Routing Routing decides the best path for the ...

Sushant Gaurav

P2P(Peer To Peer) File Sharing

Peer-to-peer has decentralized the simplest form of network architecture where every computer system can communicate with every other computer system. In the peer-to-peer network, each node of the network has equal permission and responsibility for processing the data or information. Each computer network in the peer-to-peer computer network architecture acts as an independent workstation and ...

Agam Jyot Singh

Hot Standby Router Protocol

The Hot Standby Router Protocol (HSRP) makes sure that when access circuits or network edge devices have first-hop failures, user traffic is instantly and transparently restored. With HSRP, you can set up two or more routers as standby routers and just one router as active at once. The Hot Standby Router Protocol (HSRP) allows devices ...

Priyanshu Pandey

Difference between Ping and Traceroute

In computer networks, the data between sender and receiver is transferred in small units or blocks known as packets. Each packet is transmitted separately and may take a different path to reach its destination. Once all of these packets of the original message arrive at their destination, they are reassembled to form the original message. ...

Sindhuja Gudala

Route Poisoning and Count to Infinity Problem

This article explains the Route Poisoning and Count to infinity problem which is caused by the routing loop (A network problem in which packets continue to be routed in an endless circle) in the Distance Vector Routing (DVR) network protocol. The Distance Vector Routing protocol acquires information/ packets from its neighbor routers/nodes to reach the ...

Sushant Gaurav

TCP Server-Client Implementation

The communication between different processes on the same nodes or different nodes in a network is done using the concept of a socket. A socket is a structure that allows communication between processes (of the same or different machines) i.e. sending and receiving data over a network. A socket works with the port number associated ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...

Akshay Mishra

Adding Security to Routing Protocols

The optimum route between the source and destination networks is found during the routing process by a layer 3 device (either a router or a layer 3 switch). Dynamic routing protocols are used to reduce administrator workload, i.e., administrators need to set up less, however by default, all routing information is exposed to all interested ...

Trapti Gupta

Context-based Access Control

Context Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall and filtering of traffic is performed by it at the different OSI model layers. Traffic Filtering, Traffic Examine, Intrusion Prevention, and alert and audit traits are done by the CBAC. Introduction Context Based ...