Articles for category: Computer Network

Trapti Gupta

C Program for File Transfer Using UDP

UDP is an unreliable protocol. It does not create a dedicated path for transmitting packets. So it is a connectionless protocol. Its header size is very small i.e. 8 bytes only. What is UDP? User Datagram Protocol is abbreviated as UDP. UDP works on the transport layer. UDP is a connectionless and unreliable protocol. There ...

Priyanshu Pandey

How to Make Open Ports Secure?

What Are Open Ports and How Do They Work? A port is a communication endpoint where all network communications begin and end. A port recognizes a specific process or service and is assigned a number based on its specialized function. Network ports allow devices to communicate with each other remotely over the internet, regulating how ...

Aditya Saxena

Flooding in Computer Networks

Flooding is a technique of routing in computer networking, in which a sender node transmits packets via all the outgoing links. Flooding is similar to broadcasting in that it happens when sender packets are transferred without routing data to each network node attached. Since flooding naturally utilizes each route in the network, flooding algorithms are ...

Akshay Mishra

Shannon-Fano Algorithm for Data Compression

Lossless compression and lossy compression are two methods that can be used. In contrast to lossless compression, which preserves all data, lossy compression shrinks the size of the data by deleting extraneous information.For lossless data compression of multimedia, the Shannon-Fano Algorithm is an entropy encoding method. It gives each symbol a code depending on how ...

Akshay Mishra

Routed Protocols vs Routing Protocols

A routed protocol allows for data routing. IP and AppleTalk are two examples of routed protocols. An addressing method is necessary for such a protocol. You may determine the network that a host belongs to as well as where that host is located on that network by using the addressing scheme. A routed protocol can ...

Sushant Gaurav

Sliding Window Protocol

The sliding window protocol is a data link layer protocol that is useful in the sequential and reliable delivery of the data frames. Using the sliding window protocol, the sender can send multiple frames at a time. The sliding window protocol uses a mechanism of sequence numbers. The sender associates a sequence number to the ...

Priyanshu Pandey

Multiplexing in Computer Networks

Multiplexing is a technique that allows different analog and digital transmission streams to be handled at the same time across a shared link. Multiplexing converts a high-capacity medium into a low-capacity logical medium, subsequently shared by multiple streams. The process of combining data streams or input is called Multiplexing, and the hardware used for multiplexing ...

Mansi

Congestion Control

TCP congestion window and congestion policy are used to avoid network congestion. As the network is the main component in wireless communication, any congestion in a network must be avoided. If the data sent by the sender is not delivered by the network, it must inform the sender about it. The network, other than the ...

Snehal Jadhav

Distance Vector Routing Algorithm

Distance vector is the “Dynamic Routing” protocol. Distant vector protocol also called as Bellman-Ford algorithm used to calculate the shortest path. What is Distance Vector Routing (DVR) Protocol? Distant vector routing protocol also called as Bellman-Ford algorithm or Ford Fulkerson algorithm used to calculate a path. A distance-vector protocol calculates the distance and direction of ...

Sushant Gaurav

Synchronous Optical Network (SONET)

SONET (Synchronous Optical Network) is a standardized form of protocol that is used in digital communication between the sender and the receiver. It uses a fiber optic medium to transmit a huge amount of data across a large distance. SONET helps us to transmit data over larger distances with greater data transmission rates. We have ...