Computer Network Articles

Page 118 of 122

Multiple Access Protocols in Computer Networks

Moumita
Moumita
Updated on 16-Mar-2026 39K+ Views

Multiple access protocols are a set of protocols operating in the Medium Access Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI) model. These protocols allow multiple nodes or users to access a shared network channel efficiently, enabling several data streams originating from different nodes to be transferred through a multi-point transmission medium. The primary objectives of multiple access protocols are optimization of transmission time, minimization of collisions, and avoidance of interference between transmissions. These protocols solve the fundamental problem of how multiple devices can share a single communication channel without data corruption. Categories of Multiple Access ...

Read More

Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)

Urmila Samariya
Urmila Samariya
Updated on 16-Mar-2026 61K+ Views

Network devices or networking hardware are the physical devices that are used for establishing connections and facilitating interaction between different devices in a computer network. Each device operates at specific layers of the OSI model and serves distinct purposes in network communication. Network Devices and OSI Layers Hub Repeater Bridge Switch Router Gateway Physical Data Link Network ...

Read More

CSMA with Collision Detection (CSMA/CD

Rama Giri
Rama Giri
Updated on 16-Mar-2026 78K+ Views

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and defers transmissions until the channel is free. The collision detection technology detects collisions by sensing transmissions from other stations. On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random time interval before retransmission. How CSMA/CD Works CSMA/CD Operation Process ...

Read More

Classful Vs Classless Addressing

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 53K+ Views

Classful addressing is the original IP addressing scheme introduced in 1981 as part of the Internet Protocol. It divides IP addresses into predefined classes based on the first few bits of the address. This system was later replaced by Classless Inter-Domain Routing (CIDR) in 1993 due to inefficient IP address utilization. An IP address consists of 32 bits divided into four 8-bit sections (octets) separated by dots. Each IP address is further divided into two parts: a Network ID that identifies the network and a Host ID that identifies the specific device within that network. Classful Address Classes ...

Read More

What is Hamming Distance?

Nitya Raut
Nitya Raut
Updated on 16-Mar-2026 79K+ Views

Hamming distance is a metric for comparing two binary data strings of equal length. It measures the number of bit positions in which the two bits are different, providing a quantitative way to assess how "close" or "far apart" two binary sequences are. The Hamming distance between two strings a and b is denoted as d(a, b). This distance metric is fundamental in computer networks for error detection and correction, as well as in coding theory for comparing equal-length data words. How It Works To calculate the Hamming distance between two binary strings, we perform an XOR ...

Read More

Difference between Router and Switch

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 45K+ Views

Both Routers and Switches are network connecting devices that serve different purposes in network infrastructure. Routers work at the network layer and are responsible for finding the shortest path for packets across multiple networks, whereas switches operate at the data link layer to connect various devices within a single network. Understanding the differences between these two critical network devices is essential for anyone working with computer networks, as they perform complementary but distinct functions in data communication. Router vs Switch in Network Architecture ...

Read More

What are guided and unguided transmission media?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 54K+ Views

Transmission media is the physical path through which data signals travel in a network. It serves as the communication channel that connects different devices and systems. Telecommunication links are classified into two main categories: Guided media (wired) − uses physical cables or wires Unguided media (wireless) − uses electromagnetic waves through air Both types are used for short distance (LANs, MANs) as well as long distance (WANs) communication. Transmission Media Classification Guided Media (Wired) ...

Read More

What is ad-hoc network?

Moumita
Moumita
Updated on 16-Mar-2026 60K+ Views

An ad hoc network is a spontaneously formed network where devices connect and communicate with each other directly without requiring a central infrastructure. The term "ad hoc" is Latin for "for this, " implying an improvised or temporary arrangement. Ad hoc networks are primarily wireless local area networks (WLANs) where devices communicate peer-to-peer instead of relying on base stations or access points. Each device participates in routing by determining optimal paths using routing algorithms and forwarding data to other devices through these routes. Ad Hoc Network: Direct Device Communication ...

Read More

What is hierarchical routing?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 56K+ Views

In hierarchical routing, the routers are divided into regions. Each router has complete details about how to route packets to destinations within its own region, but it does not have any idea about the internal structure of other regions. As networks grow larger, the number of routers increases significantly. In traditional routing algorithms like Link State (LS) and Distance Vector (DV), every router needs to maintain information about all other routers. This causes routing tables to become extremely large, reducing efficiency. Hierarchical routing solves this scalability problem by organizing routers into a structured hierarchy. How Hierarchical Routing Works ...

Read More

The Diffie-Hellman Key Exchange

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 77K+ Views

The Diffie-Hellman Key Exchange (also known as exponential key exchange) is a method for securely exchanging cryptographic keys over an insecure channel. It is a fundamental building block of many secure communication protocols, including SSL/TLS and SSH. This protocol allows two parties to establish a shared secret key without directly transmitting it, making it impossible for eavesdroppers to intercept the actual key. The security relies on the mathematical difficulty of the discrete logarithm problem. How Diffie-Hellman Key Exchange Works The Diffie-Hellman key exchange works by allowing two parties (Alice and Bob) to agree on a shared secret ...

Read More
Showing 1171–1180 of 1,220 articles
« Prev 1 116 117 118 119 120 122 Next »
Advertisements