sudhir sharma

sudhir sharma

975 Articles Published

Articles by sudhir sharma

Page 2 of 98

Poison Reverse vs Split Horizon

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 3K+ Views

Routing protocols determine optimal paths for data transmission through networks by maintaining and updating routing tables. Two important loop-prevention techniques used in distance-vector routing protocols like RIP and EIGRP are Poison Reverse and Split Horizon. Both techniques address the counting-to-infinity problem that occurs when routers continuously exchange routing information, potentially creating loops that cause packets to circulate indefinitely. Split Horizon Split Horizon is a simple rule that prevents a router from advertising a route back through the same interface from which it learned that route. This technique stops routing information from bouncing between routers. ...

Read More

Schiper Eggli Sandoz Protocol

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

The Schiper Eggli Sandoz (SES) protocol is a distributed routing protocol designed to find optimal paths for data packets traversing a network. Unlike centralized routing approaches, SES distributes routing information across all routers in the network, creating a democratic system that enhances fault tolerance and network resilience. The protocol employs the Bellman-Ford algorithm to calculate shortest distances to destinations and implements split horizon techniques to prevent routing loops. Split horizon prevents routers from advertising routes back to the source from which they learned them, ensuring loop-free topology maintenance. SES Protocol: Distributed Routing Architecture ...

Read More

The Symmetric Cipher Model

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 4K+ Views

The Symmetric Cipher Model is a fundamental cryptographic approach where both sender and receiver use the same secret key for encryption and decryption. This model forms the backbone of modern secure communication, providing fast and efficient protection for sensitive data. In symmetric cryptography, the same key that encrypts plaintext into ciphertext is used to decrypt the ciphertext back to plaintext. This shared secret must remain confidential between communicating parties to maintain security. How the Symmetric Cipher Model Works The symmetric cipher process involves five essential components working together to secure data transmission: ...

Read More

2-tier and 3-tier Architecture in Networking

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 5K+ Views

Architecture in networking refers to the way a network is designed and organized, serving as the blueprint for the interaction and cooperation between different components and systems. Effective network architecture is crucial for successful network setup and requires careful planning and design. When classifying network architecture, a common division is single-tier, two-tier, or three-tier. In a two-tier architecture, the network is separated into a client tier where the end-user interacts with the system, and a server tier where applications, data, and processing power reside. This clear separation of responsibilities makes the network easier to manage, secure, and scale. ...

Read More

How Applications Coexist over TCP and UDP?

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 769 Views

When computers communicate over the internet, they follow a set of rules and protocols to ensure that data reaches its intended destination. These protocols outline how data is sent, received, and processed by computers, and are necessary for ensuring that the communication is successful. Transmission Control Protocol (TCP) is a reliable protocol that guarantees data is delivered in the correct order and without any errors. It's used for web browsing, file transfers, and email since these applications require reliable and ordered data delivery. User Datagram Protocol (UDP) is a lightweight but less reliable protocol. Unlike TCP, UDP doesn't ...

Read More

Bearer Types Used for WAP in GSM

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

A bearer type is a communication channel that carries data between two points in a network. In Wireless Application Protocol (WAP) over Global System for Mobile Communications (GSM) networks, multiple bearer types are available to transport WAP traffic, each with distinct characteristics and performance capabilities. Understanding these bearer types is crucial for optimizing data transmission and ensuring reliable WAP services on GSM networks. The choice of bearer depends on factors such as network availability, data speed requirements, cost considerations, and connection reliability. Types of Bearer Technologies WAP traffic in GSM networks can be carried over two fundamental ...

Read More

Digital Audio Broadcasting (DAB)

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 8K+ Views

Radio broadcasting has evolved significantly from its analog origins to embrace digital technology. Digital Audio Broadcasting (DAB) represents a major advancement in radio transmission, offering superior audio quality and enhanced features compared to traditional analog radio systems. DAB is a digital radio broadcasting standard that uses digital audio compression to transmit multiple audio streams efficiently over the airwaves. Unlike analog radio, DAB provides CD-quality sound along with additional data services such as program information, track listings, and text displays. How DAB Works DAB operates by converting analog audio signals into compressed digital data using MPEG-1 Audio Layer ...

Read More

IBOC Technology

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

IBOC technology, or In-Band On-Channel technology, is a digital broadcasting technology that allows radio stations to transmit both analog and digital signals simultaneously within the same frequency band. This hybrid approach enables a smooth transition from analog to digital radio while maintaining backward compatibility with existing analog receivers. IBOC operates by embedding digital audio data alongside the existing analog signal using advanced modulation techniques. The digital portion occupies unused spectrum space within the allocated channel, allowing stations to broadcast both formats without requiring additional spectrum allocation. IBOC Signal Structure ...

Read More

Network Hubs

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

A network hub is a basic networking device that serves as a central connection point for multiple devices in a Local Area Network (LAN). Hubs operate at the physical layer (Layer 1) of the OSI model and use a simple broadcast mechanism to enable communication between connected devices such as computers, printers, and servers. While hubs were widely used in early network implementations, they have largely been replaced by switches due to their inherent limitations. However, understanding hubs remains important for grasping fundamental networking concepts. How Network Hubs Work A network hub operates using a broadcast mechanism. ...

Read More

Fibre Channel Protocol

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

Fibre Channel Protocol (FCP) is a high-performance communication protocol designed to provide fast and reliable data transfers between servers and storage devices in Storage Area Networks (SANs). FCP operates by encapsulating SCSI commands within Fibre Channel frames, enabling efficient block-level data access over dedicated storage networks. How FCP Works FCP operates as a layered protocol at the transport and session layers of the OSI model. It works by encapsulating SCSI commands and data within Fibre Channel frames, which are then transmitted over a Fibre Channel network. FCP Data Flow Process ...

Read More
Showing 11–20 of 975 articles
« Prev 1 2 3 4 5 98 Next »
Advertisements