Articles for category: Computer Network

Trapti Gupta

What is Checksum?

We are here with one of the techniques used in data transmission for detecting an error. The name of that error detection algorithm is Checksum. It is essential to perform error detection in data transmission. The Checksum is an error detection technique that detects an error in a transmitted message by appending redundant bits in the message. So this ...

Sushant Gaurav

Transmission Control Protocol (TCP)

The transmission control protocol is a transport layer connection-oriented protocol that defines the standard of establishing and maintaining the conversation that will be used by the applications to exchange the data. The transmission control protocol is one of the most important and widely used protocols of the IP suite. The TCP ensures the reliable transmission and delivery of our ...

Manish Jha

World Wide Web (WWW)

The World Wide Web (popularly known as the WWW) is a troupe of web pages or websites that is stored within the web servers. This is a collection of web pages or websites connected to local computer systems with the help of the internet. The World Wide web is used to connect people through images, text pages, videos, digital content, ...

Akshay Mishra

Digital Signature in Computer Network

Digital signatures allow us to verify the author, date, and time of signatures and authenticate the message contents. To verify the integrity and validity of digital messages and documents, it employs a cutting-edge mathematical technique. It helps us combat the issue of impersonation and tampering in digital communications and ensures that the contents of a message are ...

Priyanshu Pandey

TCP/IP Protocol Suite

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols that makes data exchange between two devices possible. TCP/IP specifies how data should be packetized, addressed, transmitted, routed, and received on a network by providing end-to-end communication. As compared to the OSI model, which is a theoretical model, TCP/IP is an application and practical ...

Himanshu Yadav

IPv6 Address

A device on the internet or a local network can be identified by its IP address, which is a special address. An endpoint device in an IPv6 network is identified by an IPv6 address, which is a 128-bit alphanumeric value. It offers Efficient Routing as well as a sufficient quantity of unique IP addresses. What is ...

Priyanshu Pandey

MQTT Protocol

MQTT stands for Message Queuing Telemetry Transport and is a lightweight publish/subscribe messaging protocol for Machine to Machine(M2M) telemetry in low bandwidth environments. It was developed in 1999 by Arlen Nipper and Andy Stanford-Clark of IBM to link Oil Pipeline telemetry systems through satellite. It was once a proprietary protocol, but in 2010 MQTT was made available royalty-free, and in 2014 MQTT was made an OASIS standard. MQTT ...

Akshay Mishra

Integrated Services Digital Network (ISDN)

Integrated Services Digital Network (ISDN) comprises communication standards facilitating the concurrent digital transmission of voice, video, and data over traditional public switched telephone network circuits. Unlike its predecessor, which primarily transmitted voice, ISDN’s innovation lies in integrating speech and data on the same lines, a capability absent in traditional telephone systems. Operating as a circuit-switched ...

Neha Kumari

Hot Spot 2.0

Hotspot 2.0 (HS2), also known as Passpoint” or “Next Generation Hotspot, represents a significant evolution in public Wi-Fi access. This innovative standard, driven by the Wi-Fi Alliance and endorsed by the Wireless Broadband Alliance, simplifies and secures the process of connecting to public wireless hotspots. It’s built on the IEEE 802.11u standard, enhancing how devices discover and securely connect to network ...

Saksham Arya

How Does the Internet Work?

An internet is a huge network of networks that helps us to connect millions of computers together. These computers that are connected to each other through the internet can interact with each other over the internet. The Internet operates on a technique called packet switching. In packet switching, the data that is transferred among the different computers ...