Articles for category: Computer Network

Priyanshu Pandey

Multiplexing in Computer Networks

Multiplexing is a technique that allows different analog and digital transmission streams to be handled at the same time across a shared link. Multiplexing converts a high-capacity medium into a low-capacity logical medium, subsequently shared by multiple streams. The process of combining data streams or input is called Multiplexing, and the hardware used for multiplexing ...

Mansi

Congestion Control

TCP congestion window and congestion policy are used to avoid network congestion. As the network is the main component in wireless communication, any congestion in a network must be avoided. If the data sent by the sender is not delivered by the network, it must inform the sender about it. The network, other than the ...

Snehal Jadhav

Distance Vector Routing Algorithm

Distance vector is the “Dynamic Routing” protocol. Distant vector protocol also called as Bellman-Ford algorithm used to calculate the shortest path. What is Distance Vector Routing (DVR) Protocol? Distant vector routing protocol also called as Bellman-Ford algorithm or Ford Fulkerson algorithm used to calculate a path. A distance-vector protocol calculates the distance and direction of ...

Sushant Gaurav

Synchronous Optical Network (SONET)

SONET (Synchronous Optical Network) is a standardized form of protocol that is used in digital communication between the sender and the receiver. It uses a fiber optic medium to transmit a huge amount of data across a large distance. SONET helps us to transmit data over larger distances with greater data transmission rates. We have ...

Aditya Saxena

Collision Avoidance in Wireless Networks

In computer networking, a collision happens when multiple devices attempt to transfer data via a commonly shared circuit. In a common circuit, various devices may listen at the same time, but only one device at a time is allowed to transmit data. This requires that all other devices listen to the transmission. Many devices are ...

Neha Kumari

DNS Spoofing | DNS Cache Poisoning

Domain Name System poisoning and spoofing are kinds of cyberattacks that use DNS server susceptibility to redirect traffic aside from permissible servers on the way to fraud. When you’ve proceeded to a defrauding page, you may be at a loss on how to resolve it — even with being the exclusive one who can. You’ll ...

Priyanshu Pandey

Difference between HTTP and HTTPS

Have you ever seen http:// or https:// in a browser’s address bar while browsing a website? Both protocols allow a web server and a web browser to exchange data related to a specific website. What distinguishes these two, though? Well, https is secure since it has an extra s in it! The very short and ...

Sushant Gaurav

Build a Chatroom in Python

A chatroom is a minimal chatting application. A chatroom is a minimal server that we can create and allow several clients to connect. All the clients that are connected to the server can transfer messages and data to one another via the central server. In this project, we will broadcast our message to every client ...

Saksham Arya

Variable Length Subnet Mask

VLSM stands for variable length subnet mask is a concept that is used to divide a network into multiple subnetworks of different lengths. Introduction to Variable Length Subnet Mask (VLSM) VLSM is a concept that is used to divide a network into multiple subnetworks of different lengths and sizes. VLSM is very commonly used in ...

Prithvi Raj Kumar

How to Calculate Subnet Information for an IPv4 Address?

Subnetting is the practice of logically dividing a single large IPV4 subnet address network into multiple networks for better performance.A Subnet Mask is used to denote the network size in the subnetting process. In networking, there are two types of broadly used addresses available in this world. They are the IPV4 address and the IPV6 ...