Found 1627 Articles for Computer Network

Outdoor Mobility Model | Gauss-Markov

Mithlesh Upadhyay
Updated on 01-Sep-2023 10:48:33

159 Views

Mobility models simulate the movements of mobile nodes in network. They are for ad-hoc network research. Mobility models can affect performance and behavior of various network protocols. There are different types of mobility models. These depend on whether the movements of mobile nodes are dependent and independent of each other (group and entity mobility models respectively). Gauss-Markov mobility model is an example of entity mobility model. It was proposed for simulation of personal communication service networks. This model can capture realistic characteristics of outdoor mobility. Such as randomness, correlation, and variation. model uses one tuning parameter to adjust degree ... Read More

Open Shortest Path First (OSPF) Protocol

Mithlesh Upadhyay
Updated on 01-Sep-2023 10:45:15

1K+ Views

Open Shortest Path First (OSPF) is a routing protocol for IP networks. It is used within a network or area. OSPF is an interior gateway protocol designed for a single autonomous system. OSPF uses a link-state routing algorithm. Each router has information about every link and router in the network. It finds the shortest path to each destination. OSPF learns about all routers and subnets in the network to build a link-state database (LSDB). Routers exchange link-state advertisements (LSAs) to share information about routers, subnets, and more. Basic Terms Link-state − Description of a link between two routers, including ... Read More

OSI, TCP/IP and Hybrid Models in Computer Networks

Mithlesh Upadhyay
Updated on 31-Aug-2023 19:14:12

433 Views

Data communication is sharing information between devices over a network. Models and protocols enable it. Two common models are OSI and TCP/IP. We will explain them and the hybrid model, comparing their features, advantages and disadvantages. The OSI Model The OSI model stands for Open Systems Interconnection model. It was developed by the International Organization for Standardization (ISO) in 1984 as a reference model for network communication. The OSI model defines seven layers of network functions, from the physical layer that deals with the transmission medium to the application layer that interacts with the user. Each layer performs ... Read More

Options Field in TCP Header

Mithlesh Upadhyay
Updated on 31-Aug-2023 19:12:20

912 Views

TCP users send packets with data and TCP header information. The header contains source, destination, and other variables. TCP header is processed at each network device during transmission. Data remains unchanged, but header details like IP address may change. Options Field in TCP Header The TCP header has an optional options field for enhancements. It can be 0-320 bits, depending on data offset size. Options field holds various types: maximum segment size, window scaling, timestamps, etc. This field shows total option length, including kind and length. Option-data field has option details like numerical value or timestamp. ... Read More

Options Field in IPv4 Header

Mithlesh Upadhyay
Updated on 31-Aug-2023 19:07:58

2K+ Views

IPv4 is used for network communication. Data packets contain important info. The IPv4 header includes an options field for flexibility and control. The options field is optional and located between header length and type of service. Its presence depends on the value in the header length field. Options Field in IPv4 Header IPv4 header contains information about the source and destination of an IP packet. It also has other parameters that affect how packets are processed by routers and hosts. It consists of a fixed part of 20 bytes, followed by an optional part of up to 40 ... Read More

Operating System Based Virtualization

Mithlesh Upadhyay
Updated on 31-Aug-2023 19:10:49

294 Views

There are several benefits to using operating system-based virtualization. You can run multiple operating systems on the same physical hardware. This can be useful for testing different operating systems, running legacy applications, or saving space on your computer. Another advantage is that it can improve performance. By isolating each operating system from others, virtualization software can prevent conflicts and improve overall system performance. It creates a layer of abstraction between the hardware and the operating systems. The virtualization software is installed on the host operating system. It manages this layer of abstraction and allows guest operating systems to access ... Read More

Difference Between DMZ and Port Forwarding

Md. Sajid
Updated on 22-Aug-2023 14:28:27

2K+ Views

The DMZ (Demilitarized Zone) and Port Forwarding are two methods for exposing a local network device to the internet. A DMZ is a specialised network segment that provides enhanced security for internet-facing services, whereas port forwarding is a technique used to expose certain internal network services to the internet. Read this article to find out more about DMZ and Port Forwarding and how they are different from each other. What is DMZ? A DMZ (Demilitarised Zone) is a network segment that creates an isolated network segment between a company's internal network and the internet. The DMZ's aim is to offer ... Read More

Difference Between CAT6 and CAT6A

Md. Sajid
Updated on 22-Aug-2023 14:18:43

71 Views

Ethernet cable standards CAT6 and CAT6A are both used for networking. They are both designed to transmit data at high rates while also providing stable network connectivity. CAT6 cables are suitable for most small to medium-sized companies that require high-speed network connectivity, but CAT6A cables provide better performance and are more suitable for larger businesses or data centres that demand greater bandwidth and more reliable network connectivity. Read this article to find out more about CAT6 and CAT6A and how they are different from each other. What is CAT6? CAT6 is an Ethernet cable standard designed to transmit data ... Read More

Difference Between Amplification and Retransmission

Md. Sajid
Updated on 22-Aug-2023 13:43:43

65 Views

Amplification and retransmission are two techniques used in communication systems to improve and extend signal transmission. Amplification and retransmission differ in that amplification increases the strength of a signal without changing its frequency or shape, whereas retransmission involves receiving a signal and transferring it through a different channel or path. Read this article to find out more about Amplification and Retransmission and how they are different from each other. What is Amplification? The process of increasing the strength or amplitude of a signal without changing its frequency or shape is known as amplification. Amplifiers are electronic devices that increase ... Read More

Difference Between USB and Ethernet

Md. Sajid
Updated on 22-Aug-2023 15:01:15

629 Views

USB and Ethernet are widely used data transfer technologies; however, they differ in their intended usage, data transfer speeds, and maximum cable lengths. Ethernet is capable of transmitting data over far longer distances than USB. Ethernet cables can be up to 100 metres long, although USB cables are normally limited to 5 metres (with some exceptions). Read this article to find out more about USB and Ethernet and how they are different from each other. What is USB? The USB communication protocol is a versatile and extensively used communication protocol that has become a standard for connecting electronic devices. ... Read More

Previous 1 ... 4 5 6 7 8 ... 163 Next
Advertisements