Found 1515 Articles for Computer Network

What is Data Encryption in the Computer Network?

Ginni
Updated on 05-May-2021 10:32:58

3K+ Views

Encryption is a technique to hide data from unauthorized persons by encoding data not to be viewed and modified. Data encryption involves converting the data into encrypted data called cipher text using a mathematical formula called an algorithm.These algorithms generate a key and then encapsulate the message with this key. There are two types of encryptions as asymmetric and symmetric, are in vogue.The presentation layer deals with the translation, encryption/decryption, authentication and compression, which are explained below−TranslationIt changes the complex data structures used by an application string, integers, structures, etc., into a byte stream that may be transmitted across the ... Read More

What are Data Link Protocols in Computer Network?

Ginni
Updated on 05-May-2021 10:29:06

2K+ Views

Protocols define a collection of rules or conventions for executing a definite function. It is a collection of the requirements that can manage the data link layer. The fundamental goals of computer broadcasting in a system environment are to transmit a limitless huge message from the source hub to the destination hub.The major service of the Data Link Layer is to send the datagram across a single connection. In Data Link Layer, the datagram can be managed by various link layer protocols on multiple connections in a path. For example, the datagram is managed by Ethernet on the primary link, ... Read More

What is Multimedia in the Computer Network?

Ginni
Updated on 05-May-2021 10:32:36

10K+ Views

Multimedia is a set of more than one media element used to produce a concrete and more structured communication method. In other words, multimedia is the simultaneous use of data from different sources. These sources in multimedia are known as media elements.Multimedia is the holy grail of networking. It brings vast technical challenges in providing (interactive) video on demand to every home and equally immense profits out of it. Multimedia is just two or more media. Generally, the term multimedia means the combination of two or more continuous media. In practice, the two media usually are audio and video.Elements of ... Read More

Differentiate between Datagram Approach and Virtual Circuit in Computer Network.

Ginni
Updated on 05-May-2021 10:24:11

6K+ Views

Datagram ApproachA packet-switching technology in which a packet exists is called a datagram. It is treated as a separate entity. Each packet includes data about the destination, and the switch helps this data forward the packet to the right destination. It is also known as connectionless switching.Virtual CircuitVirtual Circuit is also referred to as connection-oriented switching. A fixed, consistent direction through the transmitter’s network is settled in the virtual circuit method earlier any packets are transmitted. This direction remains constant for the session period.DifferencesThe major differences between the datagram approach and virtual circuit are as follows −Datagram ApproachVirtual CircuitThere is ... Read More

What is Quality of Service (QOS)?

Ginni
Updated on 05-May-2021 10:32:07

22K+ Views

Quality of Service (QOS) determines a network's capability to support predictable service over various technologies, containing frame relay, Asynchronous Transfer Mode (ATM), Ethernet, SONET IP-routed networks. The networks can use any or all of these frameworks.The QOS also provides that while supporting priority for one or more flows does not create other flows fail. A flow can be a combination of source and destination addresses, source and destination socket numbers, session identifier, or packet from a specific application or an incoming interface.The QOS is primarily used to control resources like bandwidth, equipment, wide-area facilities etc. It can get more efficient ... Read More

What is Congestion Control Algorithm?

Ginni
Updated on 01-Nov-2023 06:04:30

63K+ Views

Congestion causes choking of the communication medium. When too many packets are displayed in a method of the subnet, the subnet's performance degrades. Hence, a network's communication channel is called congested if packets are traversing the path and experience delays mainly over the path's propagation delay. There is two congestion control algorithm which is as follows: Leaky Bucket The leaky bucket algorithm discovers its use in the context of network traffic shaping or rate-limiting. The algorithm allows controlling the rate at which a record is injected into a network and managing burstiness in the data rate. ... Read More

What are the types of IPv4 Addresses?

Ginni
Updated on 05-May-2021 10:23:41

6K+ Views

IPv4 supports various types of addressing modes which are as follows−UnicastIt is created to a single network interface located on a specific subnet and facilitates one to-one communication. This is a unique address worldwide for the identification of a machine on the network.Subnet prefix: The subnet prefix is a network identifier or network address portion of an IP unicast address. It must be noted that all nodes on the corresponding physical or logical subnet must help the same subnet prefix, which eventually turns into unique within the entire TCP/IP network.Host ID: The host ID, a host address area of an ... Read More

What is IPv4 Addressing?

Ginni
Updated on 05-May-2021 10:19:29

3K+ Views

IPv4 addresses are merely used as identifiers, which operate at the network layer to identify IP packets source or destination. The version of IP that is in use is known as IPv4. In this version, every node on the Internet can have one or more interfaces, and we are needed to recognize each of these devices with a specific address assigned to each of them. It represents that each node is created one or more IP addresses to conjure TCP/IP. These are logical addresses and include 32 bits.IP addresses are defined using binary notation with a 32-bit long string. Dotted ... Read More

What is a Routing Table in a Computer Network?

Ginni
Updated on 05-May-2021 10:18:58

1K+ Views

Each router on the network supports a routing table in memory that may be simple or complex. In the simplest form, the table consists of pairs of IP addresses.When the originating station involves that the intended destination is directly reachable, the frame is sent immediately to the frame's destination IP address. In such a situation, a unique address occurs in the routing table known as Default Gateway Address.The routing decisions depend on the following points:The destination IP address and router IP are concealed to decide if the incoming packet Notes is to be forwarded to another network or not. If ... Read More

Distinguish between Connection-Oriented and Connectionless Service

Ginni
Updated on 05-May-2021 10:16:09

8K+ Views

Connection-Oriented ServicesIn a connection-oriented service, each packet is related to a source/destination connection. These packets are routed along a similar path, known as a virtual circuit. Thus, it provides an end-to-end connection to the client for reliable data transfer.It delivers information in order without duplication or missing information. It does not congest the communication channel and the buffer of the receiving device. The host machine requests a connection to interact and closes the connection after the transmission of the data.Mobile communication is an example of a connection-oriented service.Connectionless-ServiceIn connectionless service, a router treats each packet individually. The packets are routed ... Read More

Advertisements