Articles for category: Computer Network

Trapti Gupta

Token Ring in Computer Networks

The token is a 3-byte small-size frame. And the token ring is one of the communication protocols in the Local Area Network(LAN). In a token ring, devices are connected in a ring topology and exchange tokens with each other. A token is required for a station to transmit data. What is Token Ring in Computer ...

Shivam Verma

Static Routing

Static routing is a fundamental concept in computer networking in which network routers are manually configured to direct traffic between different networks or subnets. Unlike dynamic routing, which uses protocols to exchange routing information and make routing decisions dynamically, static routing needs administrators to manually establish the routes that data packets should take. The static ...

Priyanshu Pandey

What is IP Routing?

IP routing, or Internet Protocol routing, is the process of determining the optimal path for data packets to travel from the source to their destination over an IP-based network. This network could be a local network or the worldwide Internet. IP routing involves using routing algorithms and protocols to decide how to forward data packets ...

Priyanshu Pandey

Multicasting in Computer Network

Multicasting is a method of communication that allows data to be sent to more than one destination simultaneously. It is commonly used for applications such as video conferencing, online gaming, and live streaming. Multicast networking relies on the simple idea that a single packet can be delivered by a server and received by a large ...

Akshay Mishra

What is Stack Organization?

Stack organization refers to a computer architecture where memory is managed in a Last-In-First-Out (LIFO) structure. It’s commonly used for function calls and local variables. The stack contains data such as return addresses and values, aiding program flow. This organized approach simplifies memory management and improves efficiency in execution. What is a Stack Organization? Stack ...

Priyanshu Pandey

Network Layer Protocols

Network Layer is responsible for how a machine in a network can communicate with a machine in a different network. The primary goal of this layer is to deliver packets from a source to a destination. The network layer splits data into fragments(data packets) and sends these fragments, which are then combined once the processing ...

Akshay Mishra

SDN

Until the introduction of software-defined networking (SDN), a class of technologies that separates the network control plane from the forwarding plane to enable more automated provisioning and policy-based administration of network resources, hardware ruled the networking industry. The most accurate definition of SDN is the technology that separates the management of network devices’ control planes from the underlying data ...

Kanchan Jeswani

Physical Layer in OSI Model

OSI (Open System Interconnection) model is a conceptual model that is used to describe seven layers that computer systems use to communicate over a network. This model has been described in the form of 7 layers namely, Physical layer, Network layer, Data Link layer, transport layer, session layer, presentation layer and the application layer. All these 7 layers work together to transmit the ...

Shubhrima Jana

Flow Control and Error Control

Data Link Layer is responsible for reliable point-to-point data transfer over a physical medium. To implement this data link layer provides three functions : What is Flow Control in the Data Link Layer? Flow control is a set of procedures that restrict the amount of data a sender should send before it waits for some acknowledgment from the ...

Trapti Gupta

Cryptography and Network Security

Cryptography is a term used in data communication that refers to protecting the private information shared between two parties. Network Security refers to securing and protecting the network and data to ensure the confidentiality of data. What is Cryptography? Cryptography generally deals with the study and practice of techniques for ensuring secure communication between two parties ...