Computer Network Articles

Page 65 of 122

What is Dense Wavelength division multiplexing (DWDM)?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 3K+ Views

Dense Wavelength Division Multiplexing (DWDM) is a technology that multiplexes data signals from different sources so they can share a single optical fiber pair while maintaining complete separation of the data streams. DWDM can handle higher speed protocols up to 100 Gbps per channel, with each channel separated by only 0.8nm. Dense wavelength division multiplexing works on the same principle as CWDM but provides increased channel capacity and can be amplified to support much longer distances. Dense Wavelength Division Multiplexing (DWDM) λ1 (1530nm) ...

Read More

What is network services terminology?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 511 Views

The real function of every layer in the OSI model is to provide services to the layer above it. Understanding the terminology used in network services is essential for comprehending how different layers interact and communicate with each other. Key Network Service Entities Entities are active elements within each layer that can be either software-based (like processes) or hardware-based (like intelligent I/O chips). Peer entities are corresponding entities that exist in the same layer on different machines and communicate using the same protocol. Service Provider and Service User Relationship ...

Read More

What is Attenuation Distortion in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 4K+ Views

Attenuation distortion is a type of transmission impairment that occurs when a signal loses strength as it travels through a communication medium. This phenomenon causes the received signal to have reduced amplitude compared to the original transmitted signal, potentially making it difficult for the receiver to properly interpret the data. Attenuation distortion affects both analog and digital signals. In analog transmission, the signal's amplitude decreases and its shape may change. In digital transmission, the weakened signal can cause bit errors, where 1s may be interpreted as 0s or vice versa. How Attenuation Distortion Works As signals propagate ...

Read More

What are noise impairments in Computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

Noise impairments are unwanted signals that interfere with data transmission in computer networks, causing the received signal to differ from the transmitted signal. Noise is one of the primary causes of transmission impairments that degrade signal quality and can lead to data corruption. In analog signals, noise causes changes in amplitude or wave shape, while in digital signals, noise can flip bits from 0 to 1 or vice versa, leading to transmission errors. Signal Transmission with Noise Original Signal: ...

Read More

What are static routing algorithms in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

A static routing algorithm is a form of routing that occurs when a router uses manually configured routing entries rather than automatically discovered routes. In static routing, network administrators manually add routing entries to the routing table. Static routes are fixed and do not change automatically when the network topology is modified or reconfigured. Unlike dynamic routing protocols, static routes remain in the routing table until manually removed or modified by an administrator. Static and dynamic routing are not mutually exclusive approaches. They are commonly used together on routers to maximize routing efficiency and provide backup routes when ...

Read More

What are load sensitive routing algorithms?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 711 Views

Load-sensitive routing algorithms are adaptive routing protocols that make path selection decisions based on the current network load and traffic conditions. These algorithms adjust routing paths dynamically to avoid congested links and optimize network performance. Load-sensitive routing was initially integrated into early Internet routing algorithms during the ARPANET era. However, it was later abandoned for several decades due to stability issues, including overreaction to network changes and permanent oscillation effects that degraded network performance. How Load-Sensitive Routing Works Load-sensitive routing algorithms continuously monitor network conditions such as link utilization, delay, and congestion levels. When a link becomes ...

Read More

What are IPV6 Unicast Addresses in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 783 Views

Internet Protocol version 6 (IPv6) allows data transfer to take place over networks with improved efficiency, performance, and security compared to IPv4. Most importantly, it enables service providers to reduce the size of their routing tables while providing a vastly expanded address space. Representation of IPv6 IPv6 consists of 128 bits represented by eight groups of hexadecimal digits, with each group containing 16 bits separated by colons. Example of IPv6 Address 2002:0db6:65a3:0000:0000:6a2e:0270:7443 IPv6 Address Types Unicast One-to-one ...

Read More

What is UDP Datagram Format in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

The User Datagram Protocol (UDP) is a transport layer protocol defined for use with the IP network layer protocol. UDP provides a connectionless, unreliable datagram service that prioritizes speed and simplicity over guaranteed delivery. UDP Datagram Format The UDP datagram has an 8-byte header followed by the data payload. This compact header structure contributes to UDP's efficiency and low overhead. UDP Datagram Format Source Port (16 bits) Dest Port (16 bits) Length (16 bits) ...

Read More

What are the Stream Control Transmission Protocol (SCTP) services?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 4K+ Views

The Stream Control Transmission Protocol (SCTP) is a transport layer protocol designed to address the limitations of TCP and UDP for modern Internet applications. Operating at the same layer as TCP and UDP, SCTP provides reliable, message-oriented communication with advanced features like multihoming and multistreaming. SCTP was specifically developed for applications that require more sophisticated services than TCP can provide, including telephony signaling protocols (IUA, M2UA, M3UA), media gateway control (H.248), and IP telephony applications (H.323, SIP). SCTP Protocol Stack Position Application Layer ...

Read More

What is RPC Implementation?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

Remote Procedure Call (RPC) is a protocol that allows a program running on one computer to execute procedures or functions on another computer across a network. The calling program doesn't need to understand the underlying network details, making remote operations appear as local function calls. RPC abstracts the complexity of network communication, enabling distributed applications to interact seamlessly across different systems and networks. Applications of RPC RPC is widely used in various systems and applications: Active Directory service − Windows uses RPC for domain authentication and directory services. MMC terminals − Microsoft ...

Read More
Showing 641–650 of 1,219 articles
« Prev 1 63 64 65 66 67 122 Next »
Advertisements