Computer Network Articles

Page 115 of 122

What are data link layer design issues?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

The Data Link layer is located between physical and network layers. It provides services to the Network layer and receives services from the physical layer. The scope of the data link layer is node-to-node communication. OSI Layer Stack - Data Link Layer Position Network Layer Data Link Layer Physical Layer Services to Network Layer Services from Physical Layer Node-to-node communication scope The following are the ...

Read More

Error-Detecting Codes - Checksums

George John
George John
Updated on 16-Mar-2026 52K+ Views

When bits are transmitted over the computer network, they are subject to get corrupted due to interference and network problems. The corrupted bits lead to spurious data being received by the receiver and are called errors. Error detection techniques are responsible for checking whether any error has occurred in the frame that has been transmitted via network. They do not determine the number of error bits or the type of error, but simply detect the presence of corruption. For error detection, the sender needs to send some additional redundant bits along with the data bits. The receiver performs ...

Read More

What are the services provided by the transport layer?

Ginni
Ginni
Updated on 16-Mar-2026 45K+ Views

The services provided by the transport layer ensure reliable end-to-end data delivery between applications running on different hosts. These services hide the complexities of the underlying network and provide a uniform interface to the session layer. Address Mapping Address mapping involves translating transport addresses to network addresses. When a session entity requests to send a Transport Service Data Unit (TSDU) to another session entity, it provides its transport service access point address for identification. The transport entity then determines the corresponding Network Service Access Point (NSAP) address to establish proper routing. Assignment of Network Connection The ...

Read More

Difference between Private and Public IP addresses

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 27K+ Views

An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address serves two primary functions: identifying a host or network interface, and providing location addressing to establish communication paths. IP addresses can be either Public or Private, each serving different networking purposes. Understanding this distinction is crucial for network configuration and security. Public vs Private IP Address Architecture Internet ...

Read More

CSMA with Collision Avoidance (CSMA/CA)

Paul Richard
Paul Richard
Updated on 16-Mar-2026 52K+ Views

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. In contrast to CSMA/CD (Carrier Sense Multiple Access/Collision Detection) that deals with collisions after their occurrence, CSMA/CA prevents collisions prior to their occurrence. CSMA/CA is primarily used in wireless networks where collision detection is difficult or impossible due to the hidden terminal problem and the inability to simultaneously transmit and receive on the same channel. How CSMA/CA Works The algorithm of CSMA/CA follows these steps: When a frame is ready, ...

Read More

3D passwords-Advanced Authentication Systems

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 618 Views

As the world continues to grow more digital, the need for secure and robust authentication systems becomes increasingly important. Traditional passwords have been the standard method of authentication, but with the rise of hacking and cybercrime, new authentication methods are needed. One such method is 3D passwords, an advanced authentication system that combines multiple factors for enhanced security. What are 3D Passwords? 3D passwords are an advanced authentication system that adds multiple layers of security beyond traditional password-based systems. They are based on the concept that humans can recognize and remember three-dimensional interactions more intuitively than conventional text ...

Read More

4G Mobile Communication Technology

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 1K+ Views

4G (Fourth Generation) mobile communication technology represents a significant leap in wireless communication, offering high-speed data transmission, enhanced network capacity, and improved user experience compared to previous generations. First commercially deployed in 2010, 4G technology has transformed how we connect, communicate, and consume digital content on mobile devices. 4G networks utilize advanced technologies like LTE (Long Term Evolution) and WiMAX to deliver internet speeds up to 100 Mbps for mobile users and up to 1 Gbps for stationary users, making it suitable for bandwidth-intensive applications like video streaming, online gaming, and cloud services. 4G ...

Read More

5 Layer Architecture of Internet of Things

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 6K+ Views

The Internet of Things (IoT) has emerged as one of the most transformative technological innovations of the modern era, enabling interconnectivity of devices and machines that we use in our daily lives. IoT has revolutionized the way we interact with technology and the world around us, paving the way for new business models, improved efficiency, and greater convenience. To enable interconnectivity of devices and machines, a robust and scalable architecture is necessary. The 5-layer architecture of IoT is a widely accepted framework that provides a structured approach to IoT system design and implementation. This layered approach ensures seamless data ...

Read More

60 Hz vs 144 Hz Does it matter

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

When it comes to gaming monitors, one of the key specifications that is often discussed is refresh rate. A monitor's refresh rate determines how many times per second the screen is updated with new information. The two most popular refresh rates are 60 Hz and 144 Hz. While many gamers swear by the benefits of a 144 Hz monitor, others argue that the difference is negligible. 60 Hz vs 144 Hz Refresh Rate Comparison 60 Hz 60 updates/second Standard refresh rate ...

Read More

A Model for Network Security

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 6K+ Views

With rapid advancement of technology and growth of the internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and the consequences of a successful attack can be devastating. This article presents a comprehensive model for network security that organizations can implement to protect their networks. Network Security Model Perimeter Security Firewalls, IDS Access Control RBAC, Passwords Data Protection ...

Read More
Showing 1141–1150 of 1,220 articles
« Prev 1 113 114 115 116 117 122 Next »
Advertisements