Articles for category: Computer Network

Trapti Gupta

Distance Vector Routing v/s Link State Routing

Routing is the process of choosing the path in the network. Distance vector routing is the routing protocol that selects the path based on parameter distance. Link State routing protocol is the protocol that chooses the best path based on the cost of the path. Introduction to Routing Routing decides the best path for the ...

Sushant Gaurav

P2P(Peer To Peer) File Sharing

Peer-to-peer has decentralized the simplest form of network architecture where every computer system can communicate with every other computer system. In the peer-to-peer network, each node of the network has equal permission and responsibility for processing the data or information. Each computer network in the peer-to-peer computer network architecture acts as an independent workstation and ...

Agam Jyot Singh

Hot Standby Router Protocol

The Hot Standby Router Protocol (HSRP) makes sure that when access circuits or network edge devices have first-hop failures, user traffic is instantly and transparently restored. With HSRP, you can set up two or more routers as standby routers and just one router as active at once. The Hot Standby Router Protocol (HSRP) allows devices ...

Priyanshu Pandey

Difference between Ping and Traceroute

In computer networks, the data between sender and receiver is transferred in small units or blocks known as packets. Each packet is transmitted separately and may take a different path to reach its destination. Once all of these packets of the original message arrive at their destination, they are reassembled to form the original message. ...

Saksham Arya

HTTP Non-Persistent & Persistent Connection

HTTP (Hypertext Transfer Protocol) is an application layer protocol that is used to establish a connection between a client and a server so that the client can transfer data to the server and vice versa. HTTP is divided into two categories i.e. Non-Persistent connection HTTP and Persistent connection HTTP. In this article, we will discuss ...

Trapti Gupta

Authentication, Authorization, and Accounting

AAA (Authentication, Authorization, and Accounting) is a framework that allows access to network resources. User identification is the process of authentication and then what resources access is allowed to the user is decided by the authorization. Accounting is used to determine the usage of network resources. Introduction to AAA AAA stands for Authentication, Authorization, and ...

Priyanshu Pandey

Differences Between Virtual Circuits & Datagram Networks

Virtual Circuits are also known as connection-oriented switching. Virtual circuit switching establishes a predetermined path before messages are sent. In contrast, a datagram is a packet-switching technique in which each packet, known as a datagram, is treated as a separate entity. Each packet carries destination information, which the switch uses to route the packet to ...

Akshay Mishra

Telnet in Computer Networks

TELNET is an acronym for TErminaL-NETwork. It is a form of protocol that makes it possible for one computer to connect to a nearby computer. It is employed as a common TCP/IP protocol for the virtual terminal service provided by ISO. The local computer is the one that establishes the connection. A remote computer is ...

Aditya Saxena

Program for IP Forwarding Table Lookup

There exists a routing table in the Unix operating system consisting of several tuples that contain the I.P. (Internet Protocol) address of the network, the subnet mask, the IP address of the gateway, and the name of the interface. This information is required for forwarding packets to the exterior of the network for connecting to ...