Computer Network Articles

Page 39 of 122

The 802.16 MAC Sublayer Protocol

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

The IEEE 802.16 is a set of standards defining the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access. It lays down the standards for both physical layer as well as medium access control (MAC) layer for WiMAX. The IEEE 802.16 MAC sublayer is a part of the data link layer. The data link layer of WiMAX is divided into three sublayers as follows − Security sublayer − This is the bottommost layer and is concerned with the ...

Read More

The Bluetooth Radio Layer

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

The Bluetooth Radio Layer is the lowest layer of Bluetooth architecture that corresponds to the physical layer of the OSI model. It lays down the physical structure and specifications for the transmission of radio waves. Bluetooth Protocol Stack Application Layer L2CAP (Logical Link Control) HCI (Host Controller Interface) LMP (Link Manager ...

Read More

Logical Link Control Adaptation Protocol (L2CAP)

Moumita
Moumita
Updated on 16-Mar-2026 7K+ Views

The Logical Link Control and Adaptation Protocol (L2CAP) is a crucial protocol in the Bluetooth standard that provides adaptation between higher layers and the baseband layer of the Bluetooth protocol stack. It operates just above the Host Controller Interface (HCI), passing data frames from the higher layers to either HCI or the Link Manager. L2CAP acts as a bridge between applications and the lower-level Bluetooth radio components, handling the complexities of data formatting and transmission management. Bluetooth Protocol Stack with L2CAP Applications (Audio, ...

Read More

Difference between Client-Server and Peer-to-Peer Network

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 5K+ Views

Both Client-Server and Peer-to-Peer networks are fundamental architectures for data communication, each serving different purposes in modern networking. While client-server networks use a centralized approach with dedicated servers, peer-to-peer networks distribute responsibilities among all connected devices. Understanding the differences between these architectures is crucial for selecting the right network model for specific applications and use cases. What is a Client-Server Network? A client-server network is a centralized architecture where clients (requesting devices) communicate with dedicated servers (service providers) through the network. The server manages resources, processes requests, and provides services to multiple clients simultaneously. ...

Read More

Difference between site to site VPN and remote access VPN

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 2K+ Views

Both Site-to-Site VPN and Remote Access VPN are types of virtual private networks used for securely transferring data and accessing resources from remote locations over public networks. While they share the common goal of establishing secure connections, they serve different purposes and operate in distinct ways. In this article, we will differentiate Site-to-Site VPN and Remote Access VPN based on their features, implementation, and use cases. What is a VPN? A Virtual Private Network (VPN) connects users or networks to a private network across a public network, enabling secure data transmission as if they were directly connected ...

Read More

What is Data Link Layer Switching?

Moumita
Moumita
Updated on 16-Mar-2026 18K+ Views

Data Link Layer Switching is the process of forwarding data frames between network segments using MAC addresses. This switching occurs at Layer 2 of the OSI model, where network devices called bridges and switches examine destination MAC addresses to determine the appropriate output port for frame forwarding. The data link layer receives a stream of bits from the physical layer, organizes them into frames, and uses switching to deliver these frames to their intended destinations within the same network segment or across connected segments. Data Link Layer Switching Process ...

Read More

What is Virtual LAN?

Moumita
Moumita
Updated on 16-Mar-2026 17K+ Views

A Virtual Local Area Network (VLAN) is a logical grouping of devices that appear to be on the same LAN regardless of their physical network location. Network administrators use VLANs to partition networks based on functional requirements, allowing devices to communicate as if they were connected to separate physical LANs. VLAN Configuration Example Switch PC1 (Sales) PC2 (Sales) ...

Read More

What is Cut-through switching?

Moumita
Moumita
Updated on 16-Mar-2026 945 Views

In data communications, cut-through switching is a method of switching data frames or packets where the switching device (bridge or switch) forwards the frames as soon as the destination address is available without waiting for the rest of the data to arrive. Working Principle Cut-through switching is used in packet switching systems. In packet-switching, the message is divided into a number of units called packets that are individually routed from the source to the destination. There is no need to establish a dedicated circuit for communication, since it is a connectionless network switching technique. In cut-through switching, ...

Read More

What is Wormhole switching?

Moumita
Moumita
Updated on 16-Mar-2026 1K+ Views

In data communications, wormhole switching is a flow control technique where large data frames or packets are partitioned into smaller units and then transmitted. When a switching device (a bridge or a switch) receives a data packet, it partitions the packet into small parts called flow control units or flits. The flits are transmitted one by one instead of the whole packet. Also called wormhole flow control, wormhole switching is a subtype of flit-buffer flow control methods and is based upon fixed links. Wormhole Switching — Packet Division Original Packet ...

Read More

Address Space Layout Randomization (ASLR)

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 435 Views

Address Space Layout Randomization (ASLR) is a critical security mechanism that randomizes the memory layout of running programs to prevent attackers from predicting memory addresses. This makes it significantly harder for malicious code to exploit memory corruption vulnerabilities. Memory corruption vulnerabilities occur when a program mistakenly writes attacker-controlled data outside of an intended memory region. This may crash the program or, worse, provide the attacker full control over the system. ASLR serves as a failsafe mechanism to limit the damage should such vulnerabilities be exploited. How ASLR Works ASLR works by randomizing the memory locations where program ...

Read More
Showing 381–390 of 1,219 articles
« Prev 1 37 38 39 40 41 122 Next »
Advertisements