Computer Network Articles

Page 37 of 122

Difference between IP Address and MAC Address

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 4K+ Views

Both MAC Address and IP Address are used to identify a computer on a network or on the Internet. MAC address is provided by the NIC Card's manufacturer and gives the physical address of a computer. IP address is provided by the Internet Service Provider and is called the logical address of a computer connected on a network. Understanding the distinction between these two addressing schemes is crucial for network administration and troubleshooting. What is an IP Address? An IP (Internet Protocol) Address is a unique numerical identifier assigned to every device connected to a network that ...

Read More

Difference between Static IP Address and Dynamic IP Address

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 13K+ Views

Static IP Address and Dynamic IP Address are two methods used to assign unique identifiers to devices on a network. Static IP addresses remain fixed and are manually configured, while dynamic IP addresses are automatically assigned and can change over time. Understanding the difference between these two addressing methods is crucial for network administrators, web developers, and anyone managing network infrastructure. What is an IP Address? An IP address (Internet Protocol address) is a numerical identifier assigned to each device connected to a network that uses the Internet Protocol for communication. It serves two main purposes: identifying ...

Read More

The 802.11 Frame Structure

Moumita
Moumita
Updated on 16-Mar-2026 26K+ Views

The IEEE 802.11 standard defines the architecture and specifications of wireless local area networks (WLANs). WLAN or WiFi uses high frequency radio waves instead of cables for connecting devices in a LAN. Users connected by WLANs can move around within the area of network coverage. The 802.11 MAC sublayer provides an abstraction of the physical layer to the logical link control sublayer and upper layers of the OSI network. It is responsible for encapsulating frames and describing frame formats. MAC Sublayer Frame Structure of IEEE 802.11 The main fields of a frame in WLANs as laid down ...

Read More

WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2)

Moumita
Moumita
Updated on 16-Mar-2026 676 Views

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards designed to protect network stations connected to WiFi networks. They were developed by the WiFi Alliance to deliver sophisticated data encryption technologies and improved user authentication over the pre-existing Wired Equivalent Privacy (WEP) standard. WiFi Protected Access (WPA) Wi-Fi Protected Access (WPA) was introduced in 2003 as an interim solution to address WEP's security vulnerabilities. It was designed to be backward-compatible with existing WEP hardware, enabling rapid and hassle-free adoption across wireless networks. The encryption method adopted in WPA is the Temporal Key Integrity ...

Read More

Wired Equivalent Privacy (WEP)

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide the same level of security and confidentiality in wireless networks as in wired counterparts. Features of WEP Introduction − WEP was introduced as a part of IEEE 802.11 standard in 1997 and was available for 802.11a and 802.11b devices. Encryption Method − WEP uses ...

Read More

Advanced Encryption Standard (AES)

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

The Advanced Encryption Standard (AES) is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of the USA. It is implemented worldwide in both hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless networks. Features of AES Block cipher architecture − AES is a subset of the Rijndael block cipher that operates on fixed-size data blocks. DES successor − It is stronger and faster than Data Encryption Standard (DES), providing enhanced security. Symmetric key encryption ...

Read More

What is wireless broadband (WiBB)?

Moumita
Moumita
Updated on 16-Mar-2026 9K+ Views

Wireless broadband (WiBB) is a networking technology designed to provide high-speed Internet and data services through wireless networks. Unlike traditional wired connections, wireless broadband uses radio waves to deliver connectivity, eliminating the need for physical cables to end users. Wireless broadband can be delivered through wireless local area networks (WLANs) for smaller coverage areas or wide area networks (WWANs) for broader geographical reach. Similar to other wireless services, wireless broadband can be either fixed or mobile, depending on the deployment and user requirements. Features of WiBB Last-mile wireless connectivity − WiBB connects to the Internet ...

Read More

What is dynamic frequency selection (DFS)?

Moumita
Moumita
Updated on 16-Mar-2026 827 Views

Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices. How DFS Works DFS operates by continuously monitoring the radio spectrum for radar signals. When a wireless device detects radar activity on its current channel, it must immediately cease transmission and switch to an alternative frequency within a specified timeframe to prevent interference. DFS Frequency Switching Process WiFi AP ...

Read More

Comparison of 802.16 with 802.11

Moumita
Moumita
Updated on 16-Mar-2026 2K+ Views

IEEE 802.16 is a standard that defines Wireless Interoperability for Microwave Access (WiMAX), a wireless technology that delivers network services to the last mile of broadband access. The IEEE 802.11 standard lays down the specifications of wireless local area networks (WLAN) or Wi-Fi, that connects wireless devices within a limited area. IEEE 802.16 (WiMAX) vs IEEE 802.11 (Wi-Fi) IEEE 802.16 (WiMAX) Coverage: 7-50 km Speed: Up to 100 Mbps Frequency: 2-11 GHz Use: Outdoor, wide area ...

Read More

QOS Traffic Scheduling

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

QoS traffic scheduling is a network management methodology that organizes and prioritizes data transmission based on Quality of Service (QoS) requirements. In this approach, frames or packets are mapped to internal forwarding queues according to their QoS information and then serviced using specific queuing schemes. Network devices typically maintain multiple queues, each with different priority levels. The scheduler determines the treatment given to traffic in each queue, mapping incoming traffic to appropriate queues based on its characteristics. For example, time-sensitive traffic like voice and video is placed in higher-priority queues than background data transfers. ...

Read More
Showing 361–370 of 1,219 articles
« Prev 1 35 36 37 38 39 122 Next »
Advertisements