Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Network Articles
Page 4 of 122
A Protocol Using Go-Back-N
Go-Back-N protocol, also called Go-Back-N Automatic Repeat reQuest, is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1.Working PrincipleGo – Back – N ARQ provides for sending multiple frames before receiving the acknowledgment for the first frame. The frames are sequentially numbered and a finite number of frames. The maximum number of frames that can be sent depends upon the size of the sending window. If the acknowledgment of ...
Read MoreWhat is hierarchical routing?
In hierarchical routing, the routers are divided into regions. Each router has complete details about how to route packets to destinations within its own region. But it does not have any idea about the internal structure of other regions.As we know, in both LS and DV algorithms, every router needs to save some information about other routers. When network size is growing, the number of routers in the network will increase. Therefore, the size of routing table increases, then routers cannot handle network traffic as efficiently. To overcome this problem we are using hierarchical routing.In hierarchical routing, routers are classified ...
Read MoreWhat is ad-hoc network?
An ad hoc network is one that is spontaneously formed when devices connect and communicate with each other. The term ad hoc is a Latin word that literally means "for this, " implying improvised or impromptu.Ad hoc networks are mostly wireless local area networks (WLANs). The devices communicate with each other directly instead of relying on a base station or access points as in wireless LANs for data transfer co-ordination. Each device participates in routing activity, by determining the route using the routing algorithm and forwarding data to other devices via this route.Classifications of Ad Hoc NetworksAd hoc networks can ...
Read MoreWhat is Congestion Control Algorithm?
Congestion causes choking of the communication medium. When too many packets are displayed in a method of the subnet, the subnet's performance degrades. Hence, a network's communication channel is called congested if packets are traversing the path and experience delays mainly over the path's propagation delay. There is two congestion control algorithm which is as follows: Leaky Bucket The leaky bucket algorithm discovers its use in the context of network traffic shaping or rate-limiting. The algorithm allows controlling the rate at which a record is injected into a network and managing burstiness in the data rate. ...
Read MoreWhat are guided and unguided transmission media?
In transmission media is the way the systems are connected to route data signals in a network.The telecommunication links are classified into two categories −Guided media (wired)Unguided media (wireless).Both guided and unguided are used for short distance (LANs, MANs) as well as long distance (WANs) communication.Let us discuss Guided transmission media.Guided transmission mediaGuided transmission media consists of physical connection between source and destination through a wire or a cable.There are three basic types of guided media which are as follows −Twisted pair cableCo-axial cableFiber-optic cableTwisted Pair CopperStep 1 − It is the most used media across the world. All the ...
Read MoreDifference between Router and Switch
Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ...
Read MoreWhat is Hamming Distance?
Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ...
Read MoreNMAP Cheat Sheet
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ...
Read MoreClassful Vs Classless Addressing
Classful AddressThe first addressing system to be implemented as part of the Internet Protocol was Classful Addressing. In the year 1981, the Classful addressing network architecture was first used on the Internet. The Classful addressing system was superseded by a Classless addressing scheme with the introduction of Classless Inter-Domain Routing (CIDR) in 1993.The IP address comprises up of 32 bits and is split into four sections separated by dots: part 1, part 2, part 3, and part 4.The IP address is made up of four parts, each of which is eight bits long (1 byte).Further, the 4 parts of the ...
Read MoreCSMA with Collision Detection (CSMA/CD
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and defers transmissions until the channel is free. The collision detection technology detects collisions by sensing transmissions from other stations. On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random time interval before retransmission.AlgorithmsThe algorithm of CSMA/CD is:When a frame is ready, the transmitting station checks whether the channel is idle or busy.If ...
Read More