Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Internet Articles
Page 9 of 88
What is GSM in the Computer Network?
GSM stands for Global System for Mobile Communication. It is a widely used digital cellular technology developed at Bell Laboratories in 1970 for transmitting mobile voice and data services. GSM operates at multiple frequency bands including 850MHz, 900MHz, 1800MHz, and 1900MHz. GSM is an open and digital cellular standard that enables mobile communication through a network of base stations and mobile switching centers. One of its key features is the ability to roam and switch carriers using individual mobile units when compatible partner networks are available. GSM Network Architecture GSM networks utilize different cell sizes to provide ...
Read MoreWhat are the Token Ring Frame Formats in Computer Network?
There are three types of frame formats supported on a Token Ring network: token, abort, and data/command frame. The token format is the mechanism by which access to the ring is passed from one computer to another on the network. The token format consists of three bytes, where the starting and ending delimiters indicate the beginning and end of a token frame. The middle byte is an access control byte that contains priority bits, reservation bits, a token bit, and a monitor bit. Token Ring Frame Formats ...
Read MoreWhat is IGMP in the Computer Network?
Internet Group Management Protocol (IGMP) is a network layer protocol used to manage multicast group memberships in IPv4 networks. IGMP allows devices to join multicast groups and enables routers to efficiently distribute multicast traffic only to networks that have interested receivers. Unlike multicast routing protocols that determine paths for multicast traffic, IGMP focuses solely on group membership management. It provides multicast routers with information about which hosts on their directly connected networks want to receive traffic for specific multicast groups. How IGMP Works IGMP operates locally between hosts and their directly connected multicast routers. Each multicast router ...
Read MoreWhat is SLIP in the Computer Network?
SLIP stands for Serial Line Internet Protocol. SLIP is an Internet protocol that allows users to gain Internet access using a computer modem. Today, SLIP is not used as frequently as its successor, PPP (Point-to-Point Protocol), which provides enhanced error detection and automatic configuration. SLIP is commonly used on dedicated serial links and sometimes for dialup purposes and is usually used with line speeds between 1200bps and 19.2Kbps. It is useful for allowing mixes of hosts and routers to communicate with one another (host-host, host-router and router-router are all common SLIP network configurations). SLIP defines a sequence of ...
Read MoreWhat is SCTP in the Computer Network?
Stream Control Transmission Protocol (SCTP) is a reliable, message-oriented transport layer protocol designed to address the limitations of both TCP and UDP. SCTP was developed specifically for Internet applications that require reliable data transmission while maintaining message boundaries. SCTP is particularly well-suited for modern applications such as IUA (ISDN over IP), M2UA and M3UA (telephony signaling), H.248 (media gateway control), H.323 (IP telephony), and SIP (Session Initiation Protocol). These applications benefit from SCTP's unique combination of reliability and message preservation. SCTP: Best of Both TCP and UDP ...
Read MoreWhat is Session Layer in the Computer Network?
The Session Layer is the fifth layer in the OSI model and one of the upper layers that provide user-oriented services. It sits between the Presentation Layer and Transport Layer, managing communication sessions between applications on different devices. The session layer provides a defined set of services to the presentation layer and controls the structure and interaction between application programs. It synchronizes communication, manages the direction of information flow, and handles session establishment, maintenance, and termination. The service definition and protocol specifications are defined in ISO 8326 and ISO 8327. Session Layer in OSI ...
Read MoreExplain the functions of Session Layer.
The session layer is the fifth layer in the OSI model that manages communication sessions between applications on different devices. It acts as a general-purpose toolkit providing various services for establishing, maintaining, and terminating connections between communicating users. The session layer ensures reliable data exchange by managing sessions — logical connections that allow applications to communicate effectively. It handles dialog control, synchronization, and error recovery to maintain consistent communication states. Session Layer Functions Session Setup Dialog Control Synchronization ...
Read MoreExplain the functions of Presentation Layer.
The Presentation Layer is the sixth layer of the OSI model, responsible for data formatting, encryption, and compression. It acts as a translator between the application layer and the session layer, ensuring that data from one system can be understood by another system regardless of their internal data representations. Presentation Layer Functions Application Layer Presentation Layer Data Translation Session Layer ...
Read MoreWhat are the FTP Operations?
File Transfer Protocol (FTP) provides a comprehensive set of operations for transferring files between local and remote systems. Understanding these operations is essential for effective file management across networks. FTP Operation Flow Connect Navigate Configure Transfer open, user, pass, site cd, lcd, ls, dir mode, type, structure get, put, mget, ...
Read MoreWhat is TFTP?
Trivial File Transfer Protocol (TFTP) is a simplified file transfer protocol designed for applications that require basic file transfer functionality without the complexity of full-featured protocols like FTP. TFTP operates on a client-server model and provides an inexpensive, lightweight solution for simple file operations without authentication mechanisms. TFTP is particularly useful for network bootstrapping scenarios, enabling devices to download boot images and configuration files from remote servers. It allows a device to bootstrap from a server on another physical network using the same underlying TCP/IP protocols that the operating system uses once it starts execution. Unlike TCP-based protocols, ...
Read More