Articles for category: Computer Network

Aditya Saxena

Collision Avoidance in Wireless Networks

In computer networking, a collision happens when multiple devices attempt to transfer data via a commonly shared circuit. In a common circuit, various devices may listen at the same time, but only one device at a time is allowed to transmit data. This requires that all other devices listen to the transmission. Many devices are ...

Aditya Saxena

Throughput in Computer Networks

Throughput in computer networking is the rate of successful transmission of messages over a channel of communication, such as packet radio, Ethernet, etc. The data contained in these messages may be delivered through network nodes, or over logical or physical links. Throughput is mostly measured in B.P.S. (Bits Per Second). The throughput of a network ...

Sushant Gaurav

Coaxial Cable in Computer Networks

An electrical cable with copper as a conductor material, a shielding of insulator material, and a braided mesh metal is known as a coaxial cable in computer networks. A coaxial cable is also known as a coax. The coaxial cable supports high-speed signal transfer over a larger distance as compared to other cables like twisted ...

Saksham Arya

HTTP Non-Persistent & Persistent Connection

HTTP (Hypertext Transfer Protocol) is an application layer protocol that is used to establish a connection between a client and a server so that the client can transfer data to the server and vice versa. HTTP is divided into two categories i.e. Non-Persistent connection HTTP and Persistent connection HTTP. In this article, we will discuss ...

Trapti Gupta

Authentication, Authorization, and Accounting

AAA (Authentication, Authorization, and Accounting) is a framework that allows access to network resources. User identification is the process of authentication and then what resources access is allowed to the user is decided by the authorization. Accounting is used to determine the usage of network resources. Introduction to AAA AAA stands for Authentication, Authorization, and ...

Priyanshu Pandey

Differences Between Virtual Circuits & Datagram Networks

Virtual Circuits are also known as connection-oriented switching. Virtual circuit switching establishes a predetermined path before messages are sent. In contrast, a datagram is a packet-switching technique in which each packet, known as a datagram, is treated as a separate entity. Each packet carries destination information, which the switch uses to route the packet to ...

Akshay Mishra

Telnet in Computer Networks

TELNET is an acronym for TErminaL-NETwork. It is a form of protocol that makes it possible for one computer to connect to a nearby computer. It is employed as a common TCP/IP protocol for the virtual terminal service provided by ISO. The local computer is the one that establishes the connection. A remote computer is ...

Aditya Saxena

Program for IP Forwarding Table Lookup

There exists a routing table in the Unix operating system consisting of several tuples that contain the I.P. (Internet Protocol) address of the network, the subnet mask, the IP address of the gateway, and the name of the interface. This information is required for forwarding packets to the exterior of the network for connecting to ...

Trapti Gupta

Multiplexing and Demultiplexing in Computer Networks

The process of multiplexing involves selecting an input line from the ‘n’ input lines and transmitting that selected line to the output line. The multiplexer is a device used for performing multiplexing. The demultiplexer is used for demultiplexing. And the demultiplexing process is just the reverse of the multiplexing process. Multiplexers and Demultiplexers are abbreviated ...

Trapti Gupta

Piggybacking in Computer Networks

Piggybacking is a process of attaching acknowledgment with the data packet to be sent. It is an efficient solution for reducing the bandwidth utilization of the network. TCP is a full-duplex communication protocol, so piggybacking is used to transmit packets. Introduction to Piggybacking Piggybacking is a process of attaching the acknowledgment with the data packet ...