Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
MCA Articles
Page 17 of 95
Spanning Tree Protocol
Spanning Tree Protocol (STP) is a communication protocol operating at the data link layer of the OSI model to prevent bridge loops and the resulting broadcast storms. It creates a loop-free topology for Ethernet networks. Working Principle A bridge loop is created when there are more than one paths between two nodes in a given network. When a message is sent, particularly when a broadcast is done, the bridges repeatedly rebroadcast the same message flooding the network. Since a data link layer frame does not have a time-to-live field in the header, the broadcast frame may loop forever, ...
Read MoreThe IEEE 802.1Q Standard
The IEEE 802.1Q networking standard defines the specifications for VLANs (Virtual Local Area Networks) on IEEE 802.3 Ethernet networks. Commonly referred to as Dot1Q, this standard enables network segmentation by creating logical groups of computers that appear to be on the same LAN, regardless of their physical network location. VLANs allow network administrators to partition networks based on functional requirements, where each VLAN comprises a subset of ports on single or multiple switches. This enables devices within a VLAN to communicate as if they were on a separate physical LAN, providing improved security, performance, and network management. Key ...
Read MoreMulti-Protocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) is a routing technique that augments speed and control of network traffic by directing data from one node to the next based on short path labels. Instead of being routed using long network addresses, data packets are routed through path labels that identify virtual paths between nodes rather than endpoints. MPLS speeds up traffic flows by avoiding complex lookups in the routing table at each node as in conventional routing algorithms. MPLS is a scalable and protocol-independent routing technique. It works with Internet Protocol (IP), Ethernet, Frame Relay and Asynchronous Transport Mode (ATM). Despite the ...
Read MoreExplain the ATM Cell Structure in Computer Network
ATM (Asynchronous Transfer Mode) transfers data in fixed-size units called cells. Each cell consists of exactly 53 bytes: 5 bytes for the header containing routing and control information, and 48 bytes for the payload carrying user data. The fixed-size cell structure makes ATM particularly suitable for real-time applications like voice and video transmission, as it minimizes delays caused by waiting for large variable-length packets to be processed. ATM Cell Structure (53 Bytes) Header 5 Bytes Payload (User Data) 48 Bytes ...
Read MoreWhat is the Structure of Management Information (SMI)?
Structure of Management Information (SMI) defines the rules and standards for describing managed objects within the Simple Network Management Protocol (SNMP) framework. SMI provides the syntactic structure that allows network management systems to organize, access, and manipulate network device information consistently. In SNMP, managed objects reside in a virtual database called the Management Information Base (MIB). Collections of related objects are organized into MIB modules, which are written using a subset of Abstract Syntax Notation One (ASN.1). This notation describes data structures in a machine-independent language, enabling consistent communication across different network devices and platforms. SMI Data Types ...
Read MoreWhat are the types of Firewalls in Computer Network?
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic such as viruses and hackers. There are various types of firewalls in a computer network, each designed to provide different levels of security and functionality: Packet Filtering Firewalls Packet filtering firewalls are the most basic type of firewall that operates at the network layer (Layer ...
Read MoreWhat are the FTP Connections?
File Transfer Protocol (FTP) uses two separate connections to facilitate communication between client and server. Understanding these connections is crucial for comprehending how FTP operates efficiently for file transfers. Control Connection The control connection is established first and remains active throughout the entire FTP session. This connection handles all commands and responses between the client and server. The establishment process involves two steps: The server issues a passive open on the well-known port 21 and waits for a client connection. The client uses an ephemeral port and issues an active open to ...
Read MoreHow do you measure Network Performance?
The examination and review of collective network information to describe the quality of services delivered by the underlying computer network is known as network performance. It is a qualitative and quantitative procedure that assesses and defines a network's performance level. Network performance measurement assists administrators in reviewing, evaluating, and improving network services to ensure optimal user experience and efficient resource utilization. Parameters Used to Measure Network Performance The following key parameters are used to measure network performance: Bandwidth − Maximum data transfer capacity Throughput − Actual data transfer rate achieved Latency − Time delay for ...
Read MoreWhat are the different types of Castings in computer networks?
Transmitting data in the form of packets over the internet is called casting. It refers to the method used to deliver data from one or more sources to one or more destinations across a network. Types of Casting The different types of casting are as follows: Unicast − Transmitting data from one host to another host (one-to-one) Broadcast − Transmitting data from one host to many hosts (one-to-all) Multicast − Transmitting data from one host to a particular group of hosts (one-to-many) Types of ...
Read MoreWhat is binary countdown protocol in computer networks?
The Binary Countdown Protocol is a collision-free medium access control method that resolves contention among multiple stations wanting to transmit simultaneously. It uses station addresses to determine transmission priority through a distributed arbitration process. This protocol belongs to the family of collision-free protocols, which includes: Bit-map protocol − Uses reservation bits Token passing − Circulates control tokens Binary countdown − Uses address-based arbitration How Binary Countdown Works The protocol operates through the following mechanism: Address Broadcasting − When a station wants to transmit, it broadcasts its address as a binary string, starting ...
Read More