Articles for category: Computer Network

Trapti Gupta

Multiplexing and Demultiplexing in Computer Networks

The process of multiplexing involves selecting an input line from the ‘n’ input lines and transmitting that selected line to the output line. The multiplexer is a device used for performing multiplexing. The demultiplexer is used for demultiplexing. And the demultiplexing process is just the reverse of the multiplexing process. Multiplexers and Demultiplexers are abbreviated ...

Trapti Gupta

Piggybacking in Computer Networks

Piggybacking is a process of attaching acknowledgment with the data packet to be sent. It is an efficient solution for reducing the bandwidth utilization of the network. TCP is a full-duplex communication protocol, so piggybacking is used to transmit packets. Introduction to Piggybacking Piggybacking is a process of attaching the acknowledgment with the data packet ...

Trapti Gupta

C Program for File Transfer Using UDP

UDP is an unreliable protocol. It does not create a dedicated path for transmitting packets. So it is a connectionless protocol. Its header size is very small i.e. 8 bytes only. What is UDP? User Datagram Protocol is abbreviated as UDP. UDP works on the transport layer. UDP is a connectionless and unreliable protocol. There ...

Priyanshu Pandey

How to Make Open Ports Secure?

What Are Open Ports and How Do They Work? A port is a communication endpoint where all network communications begin and end. A port recognizes a specific process or service and is assigned a number based on its specialized function. Network ports allow devices to communicate with each other remotely over the internet, regulating how ...

Aditya Saxena

Flooding in Computer Networks

Flooding is a technique of routing in computer networking, in which a sender node transmits packets via all the outgoing links. Flooding is similar to broadcasting in that it happens when sender packets are transferred without routing data to each network node attached. Since flooding naturally utilizes each route in the network, flooding algorithms are ...

Akshay Mishra

Shannon-Fano Algorithm for Data Compression

Lossless compression and lossy compression are two methods that can be used. In contrast to lossless compression, which preserves all data, lossy compression shrinks the size of the data by deleting extraneous information.For lossless data compression of multimedia, the Shannon-Fano Algorithm is an entropy encoding method. It gives each symbol a code depending on how ...

Akshay Mishra

Routed Protocols vs Routing Protocols

A routed protocol allows for data routing. IP and AppleTalk are two examples of routed protocols. An addressing method is necessary for such a protocol. You may determine the network that a host belongs to as well as where that host is located on that network by using the addressing scheme. A routed protocol can ...

Sushant Gaurav

Sliding Window Protocol

The sliding window protocol is a data link layer protocol that is useful in the sequential and reliable delivery of the data frames. Using the sliding window protocol, the sender can send multiple frames at a time. The sliding window protocol uses a mechanism of sequence numbers. The sender associates a sequence number to the ...

Priyanshu Pandey

Multiplexing in Computer Networks

Multiplexing is a technique that allows different analog and digital transmission streams to be handled at the same time across a shared link. Multiplexing converts a high-capacity medium into a low-capacity logical medium, subsequently shared by multiple streams. The process of combining data streams or input is called Multiplexing, and the hardware used for multiplexing ...

Mansi

Congestion Control

TCP congestion window and congestion policy are used to avoid network congestion. As the network is the main component in wireless communication, any congestion in a network must be avoided. If the data sent by the sender is not delivered by the network, it must inform the sender about it. The network, other than the ...