Computer Network Articles

Page 4 of 122

A Protocol Using Go-Back-N

Samual Sam
Samual Sam
Updated on 03-Nov-2023 39K+ Views

Go-Back-N protocol, also called Go-Back-N Automatic Repeat reQuest, is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1.Working PrincipleGo – Back – N ARQ provides for sending multiple frames before receiving the acknowledgment for the first frame. The frames are sequentially numbered and a finite number of frames. The maximum number of frames that can be sent depends upon the size of the sending window. If the acknowledgment of ...

Read More

What is hierarchical routing?

Bhanu Priya
Bhanu Priya
Updated on 01-Nov-2023 56K+ Views

In hierarchical routing, the routers are divided into regions. Each router has complete details about how to route packets to destinations within its own region. But it does not have any idea about the internal structure of other regions.As we know, in both LS and DV algorithms, every router needs to save some information about other routers. When network size is growing, the number of routers in the network will increase. Therefore, the size of routing table increases, then routers cannot handle network traffic as efficiently. To overcome this problem we are using hierarchical routing.In hierarchical routing, routers are classified ...

Read More

What is ad-hoc network?

Moumita
Moumita
Updated on 01-Nov-2023 60K+ Views

An ad hoc network is one that is spontaneously formed when devices connect and communicate with each other. The term ad hoc is a Latin word that literally means "for this, " implying improvised or impromptu.Ad hoc networks are mostly wireless local area networks (WLANs). The devices communicate with each other directly instead of relying on a base station or access points as in wireless LANs for data transfer co-ordination. Each device participates in routing activity, by determining the route using the routing algorithm and forwarding data to other devices via this route.Classifications of Ad Hoc NetworksAd hoc networks can ...

Read More

What is Congestion Control Algorithm?

Ginni
Ginni
Updated on 01-Nov-2023 66K+ Views

Congestion causes choking of the communication medium. When too many packets are displayed in a method of the subnet, the subnet's performance degrades. Hence, a network's communication channel is called congested if packets are traversing the path and experience delays mainly over the path's propagation delay. There is two congestion control algorithm which is as follows: Leaky Bucket The leaky bucket algorithm discovers its use in the context of network traffic shaping or rate-limiting. The algorithm allows controlling the rate at which a record is injected into a network and managing burstiness in the data rate. ...

Read More

What are guided and unguided transmission media?

Bhanu Priya
Bhanu Priya
Updated on 01-Nov-2023 54K+ Views

In transmission media is the way the systems are connected to route data signals in a network.The telecommunication links are classified into two categories −Guided media (wired)Unguided media (wireless).Both guided and unguided are used for short distance (LANs, MANs) as well as long distance (WANs) communication.Let us discuss Guided transmission media.Guided transmission mediaGuided transmission media consists of physical connection between source and destination through a wire or a cable.There are three basic types of guided media which are as follows −Twisted pair cableCo-axial cableFiber-optic cableTwisted Pair CopperStep 1 − It is the most used media across the world. All the ...

Read More

Difference between Router and Switch

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 01-Nov-2023 45K+ Views

Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ...

Read More

What is Hamming Distance?

Nitya Raut
Nitya Raut
Updated on 01-Nov-2023 79K+ Views

Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ...

Read More

NMAP Cheat Sheet

Ajay yadav
Ajay yadav
Updated on 31-Oct-2023 99K+ Views

Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ...

Read More

Classful Vs Classless Addressing

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 31-Oct-2023 53K+ Views

Classful AddressThe first addressing system to be implemented as part of the Internet Protocol was Classful Addressing. In the year 1981, the Classful addressing network architecture was first used on the Internet. The Classful addressing system was superseded by a Classless addressing scheme with the introduction of Classless Inter-Domain Routing (CIDR) in 1993.The IP address comprises up of 32 bits and is split into four sections separated by dots: part 1, part 2, part 3, and part 4.The IP address is made up of four parts, each of which is eight bits long (1 byte).Further, the 4 parts of the ...

Read More

CSMA with Collision Detection (CSMA/CD

Rama Giri
Rama Giri
Updated on 31-Oct-2023 78K+ Views

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and defers transmissions until the channel is free. The collision detection technology detects collisions by sensing transmissions from other stations. On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random time interval before retransmission.AlgorithmsThe algorithm of CSMA/CD is:When a frame is ready, the transmitting station checks whether the channel is idle or busy.If ...

Read More
Showing 31–40 of 1,219 articles
« Prev 1 2 3 4 5 6 122 Next »
Advertisements