Computer Network Articles

Page 85 of 122

Internet Control Message Protocol (ICMP)

Urmila Samariya
Urmila Samariya
Updated on 16-Mar-2026 15K+ Views

The Internet Control Message Protocol (ICMP) is a network layer protocol that operates within the OSI model's network layer and the TCP/IP model's internet layer. It serves as a communication mechanism for routers and network devices to send control and error messages throughout the network. ICMP enables network devices to report problems, query network status, and provide diagnostic information. Common ICMP messages include "destination unreachable, " "time exceeded, " and "echo requests" used by utilities like ping. ICMP Message Flow in Network Communication Host A ...

Read More

What are the challenges of a Computer Network?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 3K+ Views

Computer networks face numerous challenges that can impact their reliability, performance, and security. Understanding these challenges is crucial for IT professionals to maintain robust network infrastructure and ensure seamless communication across organizations. Network reliability encompasses issues like packet loss, bandwidth saturation, and latency. While these technical terms might seem overwhelming to smaller IT teams, the underlying problems often require systematic troubleshooting approaches beyond simple device reboots. Major Network Challenges Host Identification The Host ID is the portion of an IP address that uniquely identifies a host on a given TCP/IP network. While smaller networks can be ...

Read More

What is ISCII Encoding?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

The full form of ISCII is Indian Script Code for Information Interchange. It was established by the Bureau of Indian Standards in 1991 and is based on the earlier Indian Standard IS 10401:1982. ISCII is a coding scheme specifically designed for representing Indian languages in digital format. ISCII is an 8-bit encoding standard where the lower 128 characters (0-127) conform to the ASCII standard, and the higher 128 characters (128-255) are used to encode characters from Indian scripts. This design ensures backward compatibility with ASCII while providing support for Indic languages. ISCII 8-bit Character ...

Read More

What is Campus Area Network (CAN)?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

A Campus Area Network (CAN) is a computer network that interconnects multiple buildings within a limited geographical area such as a university campus, corporate complex, or industrial site. CAN is larger than a Local Area Network (LAN) but smaller than a Metropolitan Area Network (MAN) or Wide Area Network (WAN). The primary purpose of CAN is to provide high-speed connectivity and resource sharing between different departments, buildings, and facilities within an organization's premises. For example, a university CAN connects academic buildings, libraries, dormitories, and administrative offices, enabling seamless communication and data sharing across the entire campus. ...

Read More

What are the differences between Physical and Logical Topology?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 23K+ Views

Network topology refers to the arrangement and interconnection of network devices. Understanding network topology is crucial for network design, troubleshooting, and optimization. There are two fundamental ways to view network topology: physical topology and logical topology. Physical topology describes the actual physical layout and connections of network devices, while logical topology describes how data flows through the network regardless of the physical connections. Physical vs Logical Topology Physical Topology ...

Read More

What is a CDN? (Functions, How does it work, Advantages)

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 1K+ Views

A Content Delivery Network (CDN) is a geographically distributed network of servers that work together to provide fast delivery of Internet content. CDNs cache web content at multiple locations worldwide, bringing data closer to end users to reduce latency and improve performance. CDNs serve various types of content including web pages, images, videos, applications, and downloadable files. Major companies like Netflix, Amazon, and Facebook rely on CDNs to deliver content to millions of users efficiently across the globe. CDN Architecture Origin Server ...

Read More

Difference between a Managed and an Unmanaged Switch

Pradeep Kumar
Pradeep Kumar
Updated on 16-Mar-2026 3K+ Views

A network switch serves as the central hub connecting devices in a network, making it essential to choose the right type for your infrastructure. Switches vary in size and port count, typically offering up to 48 ports, with managed and unmanaged switches being the two primary categories. Managed vs Unmanaged Switch Architecture Managed Switch • Remote Configuration • VLAN Support • Advanced Security Unmanaged Switch • Plug-and-Play • Fixed Configuration • Lower Cost ...

Read More

How to Build a Smart Contract in Blockchain?

Gaurav Tiwari
Gaurav Tiwari
Updated on 16-Mar-2026 451 Views

A smart contract is a self-executing computer program that runs on blockchain networks, utilizing distributed ledger technology to enforce the core principles of blockchain: distributed, trustless, and transparent operations. It is an immutable digital file containing predefined code and conditions that automatically execute when specific events occur. Smart contracts follow conditional logic patterns like If/else and do/while statements, enabling automated program execution without intermediaries. They offer significant advantages over conventional operations and are widely used in DeFi (Decentralized Finance) applications for virtual currency transactions with minimal fees. Components Required for Smart Contract Development To develop Ethereum-based smart ...

Read More

How to perform an exchange on sushiswap Blockchain?

Gaurav Tiwari
Gaurav Tiwari
Updated on 16-Mar-2026 289 Views

SushiSwap is a decentralized exchange (DEX) built on blockchain technology that enables users to trade cryptocurrencies without intermediaries. As a decentralized application (DApp), it operates on a peer-to-peer network where users maintain control of their funds throughout the trading process. Unlike centralized exchanges, SushiSwap uses automated market makers (AMM) and liquidity pools to facilitate trades. Users can swap tokens, provide liquidity to earn rewards, and participate in governance through SUSHI token ownership. Key Features of SushiSwap Token Swapping − Direct peer-to-peer cryptocurrency exchanges without order books Liquidity Mining − Users earn SUSHI tokens ...

Read More

CATA protocol in Computer Network

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 768 Views

Computer networks require efficient protocols to manage address assignments and prevent conflicts as they grow in complexity. The Common Address Table Algorithm (CATA) protocol is designed to centralize IP address management and provide redundancy mechanisms for network stability. CATA builds upon existing address resolution protocols to create a distributed yet coordinated approach to IP address assignment, reducing conflicts and improving network reliability through its redundancy features. How CATA Protocol Works The CATA protocol operates through a distributed address table system where multiple nodes maintain synchronized copies of address assignments. When a device requests an IP address, the ...

Read More
Showing 841–850 of 1,219 articles
« Prev 1 83 84 85 86 87 122 Next »
Advertisements