Computer Engineering Articles

Page 27 of 36

Store – and – Forward Packet Switching

Moumita
Moumita
Updated on 16-Mar-2026 19K+ Views

In telecommunications, store-and-forward packet switching is a technique where data packets are stored in each intermediate node before being forwarded to the next node. The intermediate node verifies that the packet is error-free before transmitting, thus ensuring data integrity. The network layer typically operates using store-and-forward packet switching. Working Principle The source node delivers its packet to the nearest router. The packet is stored in the router until it has fully arrived and its checksum is verified for error detection. Once verified, the packet is transmitted to the next router. This process continues at each router until the ...

Read More

Routing within a datagram network

Moumita
Moumita
Updated on 16-Mar-2026 2K+ Views

In packet switching networks using datagrams, datagrams are data packets which contain adequate header information so that they can be individually routed by all intermediate switching devices to the destination. These networks are called datagram networks since communication occurs via datagrams. Routing Principle In datagram networks, each data packet is routed independently from the source to the destination even if they belong to the same message. No prior resource or channel allocation is done for the individual packets. As the datagrams are treated as independent units, no dedicated path is fixed for data transfer. Each datagram is ...

Read More

Datagram Network

Moumita
Moumita
Updated on 16-Mar-2026 33K+ Views

In a connectionless communication system, a datagram refers to the smallest unit via which data is transmitted. Datagrams are data packets which contain adequate header information so that they can be individually routed by all intermediate network switching devices to the destination. These networks are called datagram networks since communication occurs via datagrams. Datagram networks exist in packet switching networks and follow a store-and-forward mechanism where each packet is treated as an independent entity. Features of Datagram Networks Network layer operation − Datagram switching is performed at the network layer of the communication system. ...

Read More

Advantages and Disadvantages of VoLTE

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 14K+ Views

Voice over Long-Term Evolution (VoLTE) is a technology that enables mobile users to make voice calls over a 4G LTE network, as opposed to traditional 2G and 3G networks. This technology offers several advantages over traditional voice calling methods, but it also has some drawbacks. VoLTE vs Traditional Voice Networks Traditional (2G/3G) Circuit-switched Separate voice/data channels Lower quality Slower setup times VoLTE (4G LTE) Packet-switched Unified voice/data HD voice quality ...

Read More

Advantages and Disadvantages of WLAN

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 20K+ Views

A Wireless Local Area Network (WLAN) is a type of local area network that uses wireless communication to connect devices within a limited area. WLANs have become essential for modern businesses and homes due to their flexibility and ease of deployment. Unlike traditional wired networks, WLANs use radio frequency signals to transmit data between devices and access points, eliminating the need for physical cables while providing network connectivity. WLAN Network Architecture Access Point ...

Read More

What are Hub and Switch in Computer Network?

Moumita
Moumita
Updated on 16-Mar-2026 63K+ Views

A hub and a switch are fundamental networking devices used to connect multiple devices in a Local Area Network (LAN). While both serve the purpose of connecting computers and enabling communication, they operate at different OSI model layers and handle data transmission in distinctly different ways. Hubs A hub is a physical layer networking device that connects multiple devices in a network. It operates as a simple repeater, amplifying and forwarding electrical signals without any intelligence about the data content. When a data frame arrives at any port of a hub, it broadcasts the frame to all ...

Read More

What are Routers in Computer Network?

Moumita
Moumita
Updated on 16-Mar-2026 54K+ Views

Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are responsible for receiving, analyzing, and forwarding data packets among the connected computer networks. When a data packet arrives, the router inspects the destination address, consults its routing tables to decide the optimal route and then transfers the packet along this route. Router Operating at Network Layer Network A 192.168.1.0/24 ...

Read More

Differences between Pure Aloha and Slotted Aloha

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 59K+ Views

The Aloha Protocol allows several stations to send data frames over the same communication channel at the same time. This protocol is a straightforward communication method in which each network station is given equal priority and works independently. Aloha is a medium access control (MAC) protocol for transmission of data via a shared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel. There are two types of Aloha protocols − Pure Aloha and Slotted Aloha. In this article, we will highlight the major differences between these two protocols ...

Read More

Error-Detecting Codes - Checksums

George John
George John
Updated on 16-Mar-2026 52K+ Views

When bits are transmitted over the computer network, they are subject to get corrupted due to interference and network problems. The corrupted bits lead to spurious data being received by the receiver and are called errors. Error detection techniques are responsible for checking whether any error has occurred in the frame that has been transmitted via network. They do not determine the number of error bits or the type of error, but simply detect the presence of corruption. For error detection, the sender needs to send some additional redundant bits along with the data bits. The receiver performs ...

Read More

Difference between Private and Public IP addresses

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 27K+ Views

An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address serves two primary functions: identifying a host or network interface, and providing location addressing to establish communication paths. IP addresses can be either Public or Private, each serving different networking purposes. Understanding this distinction is crucial for network configuration and security. Public vs Private IP Address Architecture Internet ...

Read More
Showing 261–270 of 353 articles
« Prev 1 25 26 27 28 29 36 Next »
Advertisements