Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Engineering Articles
Page 27 of 36
Store – and – Forward Packet Switching
In telecommunications, store-and-forward packet switching is a technique where data packets are stored in each intermediate node before being forwarded to the next node. The intermediate node verifies that the packet is error-free before transmitting, thus ensuring data integrity. The network layer typically operates using store-and-forward packet switching. Working Principle The source node delivers its packet to the nearest router. The packet is stored in the router until it has fully arrived and its checksum is verified for error detection. Once verified, the packet is transmitted to the next router. This process continues at each router until the ...
Read MoreRouting within a datagram network
In packet switching networks using datagrams, datagrams are data packets which contain adequate header information so that they can be individually routed by all intermediate switching devices to the destination. These networks are called datagram networks since communication occurs via datagrams. Routing Principle In datagram networks, each data packet is routed independently from the source to the destination even if they belong to the same message. No prior resource or channel allocation is done for the individual packets. As the datagrams are treated as independent units, no dedicated path is fixed for data transfer. Each datagram is ...
Read MoreDatagram Network
In a connectionless communication system, a datagram refers to the smallest unit via which data is transmitted. Datagrams are data packets which contain adequate header information so that they can be individually routed by all intermediate network switching devices to the destination. These networks are called datagram networks since communication occurs via datagrams. Datagram networks exist in packet switching networks and follow a store-and-forward mechanism where each packet is treated as an independent entity. Features of Datagram Networks Network layer operation − Datagram switching is performed at the network layer of the communication system. ...
Read MoreAdvantages and Disadvantages of VoLTE
Voice over Long-Term Evolution (VoLTE) is a technology that enables mobile users to make voice calls over a 4G LTE network, as opposed to traditional 2G and 3G networks. This technology offers several advantages over traditional voice calling methods, but it also has some drawbacks. VoLTE vs Traditional Voice Networks Traditional (2G/3G) Circuit-switched Separate voice/data channels Lower quality Slower setup times VoLTE (4G LTE) Packet-switched Unified voice/data HD voice quality ...
Read MoreAdvantages and Disadvantages of WLAN
A Wireless Local Area Network (WLAN) is a type of local area network that uses wireless communication to connect devices within a limited area. WLANs have become essential for modern businesses and homes due to their flexibility and ease of deployment. Unlike traditional wired networks, WLANs use radio frequency signals to transmit data between devices and access points, eliminating the need for physical cables while providing network connectivity. WLAN Network Architecture Access Point ...
Read MoreWhat are Hub and Switch in Computer Network?
A hub and a switch are fundamental networking devices used to connect multiple devices in a Local Area Network (LAN). While both serve the purpose of connecting computers and enabling communication, they operate at different OSI model layers and handle data transmission in distinctly different ways. Hubs A hub is a physical layer networking device that connects multiple devices in a network. It operates as a simple repeater, amplifying and forwarding electrical signals without any intelligence about the data content. When a data frame arrives at any port of a hub, it broadcasts the frame to all ...
Read MoreWhat are Routers in Computer Network?
Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are responsible for receiving, analyzing, and forwarding data packets among the connected computer networks. When a data packet arrives, the router inspects the destination address, consults its routing tables to decide the optimal route and then transfers the packet along this route. Router Operating at Network Layer Network A 192.168.1.0/24 ...
Read MoreDifferences between Pure Aloha and Slotted Aloha
The Aloha Protocol allows several stations to send data frames over the same communication channel at the same time. This protocol is a straightforward communication method in which each network station is given equal priority and works independently. Aloha is a medium access control (MAC) protocol for transmission of data via a shared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel. There are two types of Aloha protocols − Pure Aloha and Slotted Aloha. In this article, we will highlight the major differences between these two protocols ...
Read MoreError-Detecting Codes - Checksums
When bits are transmitted over the computer network, they are subject to get corrupted due to interference and network problems. The corrupted bits lead to spurious data being received by the receiver and are called errors. Error detection techniques are responsible for checking whether any error has occurred in the frame that has been transmitted via network. They do not determine the number of error bits or the type of error, but simply detect the presence of corruption. For error detection, the sender needs to send some additional redundant bits along with the data bits. The receiver performs ...
Read MoreDifference between Private and Public IP addresses
An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address serves two primary functions: identifying a host or network interface, and providing location addressing to establish communication paths. IP addresses can be either Public or Private, each serving different networking purposes. Understanding this distinction is crucial for network configuration and security. Public vs Private IP Address Architecture Internet ...
Read More