Computer Engineering Articles - Page 7 of 35
15K+ Views
Both Routers and Bridges are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet, whereas Bridges connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about routers and bridges and how they are different from each other. What is a Router? A router is a networking device that receives, processes, and sends data packets from one computer network to another. On the Internet, routers are in charge of traffic steering. Data packets are used to send data across ... Read More
45K+ Views
Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ... Read More
8K+ Views
Stop and Wait protocol is a protocol for flow control mechanism. In this protocol, the sender sends one frame at a time and waits for acknowledgment from the receiver. Once acknowledged, the sender sends another frame to the receiver. Stop and Wait protocol is also a protocol for flow control mechanism. In this protocol, the sender sends multiple frames at a time and retransmits the frames which are found to be corrupted or damaged. Read through this article to find out more about these two protocols and how they are different from each other. What is Stop and Wait ... Read More
11K+ Views
The process of turning plain text into an encrypted form (cipher text) is known as encryption. Sensitive data is transmitted in an encrypted form so that it can be protected and a strong encryption mechanism ensures that the data is not misused even if a hacker gets hold of it. Decryption is the reverse mechanism where the encrypted cipher text is converted back into its original form.Read through this article to find out more about encryption and decryption and how they are different from each other.What is Encryption?Encryption is the procedure of encoding data in cryptography. This procedure turns plaintext, ... Read More
27K+ Views
What is an IP Address? An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address is used for two purposes: identifying a host or network interface, and addressing a specific location. An IP address has two primary functions: it identifies the host, or more particularly its network interface; and it indicates the host's position in the network, allowing a path to be established to that host. IP addresses can be either Public or Private. Read through this article to ... Read More
8K+ Views
A Metropolitan Area Network (MAN) is a medium-sized network but it covers a larger area than a LAN. It often covers multiple cities or towns. In contrast, a Wide Area Network (WAN) is a much larger network than LAN and MAN. A WAN in general is a network of local area networks (LANs) that link to other LANs via telephone lines and radio waves. Go through this article to find out more about MAN and WAN and how they are different from each other. What is a Metropolitan Area Network (MAN)? A MAN is comparable to a ... Read More
5K+ Views
Both LAN and MAN are computer networks that differ in terms of the geographical area they cover. LANs are private networks limited to a particular geographical area in the range of a few kilometers, while MANs cover a larger area that can span multiple cities and towns.Read through this article to find out the major differences between a LAN and a MAN.Local Area Network (LAN)A Local Area Network is a private network that connects computers and devices within a limited area like an office, a building, or a campus. On a small scale, LANs are used to connect personal computers ... Read More
13K+ Views
A stateless protocol is one in which each communication is treated as a separate event, unrelated to other communications of the same type.A stateful protocol, on the other hand, is the polar opposite of a stateless protocol, in which each communication is treated as part of a broader sequence.Read through this article to find out more about stateless and stateful protocols and how they are different from each other.What is Stateful Protocol?In Stateful Protocol, when a client sends a request to the server, it expects a response; it resends the request if it does not receive one.Stateful applications and procedures ... Read More
23K+ Views
Go-Back-N is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1.Selective Repeat Protocol is also a data link layer protocol that uses sliding window method for reliable delivery of data frames. Here, only the erroneous or lost frames are retransmitted, while the good frames are received and buffered.Read through this article to find out how these two data link layer protocols work and what are the major differences between ... Read More
59K+ Views
The Aloha Protocol allows several stations to send data frames over the same communication channel at the same time. This protocol is a straightforward communication method in which each network station is given equal priority and works independently.Aloha is a medium access control (MAC) protocol for transmission of data via a shared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel.There are two types of Aloha protocols − Pure Aloha and Slotted Aloha.In Pure Aloha, the time of transmission is continuous. Whenever a station has an available frame, it sends ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP