Articles for category: Computer Network

Trapti Gupta

TCP Timers

Various types of timers are used by the TCP to avoid excessive delay during the transmission of the segment. Some of the TCP timers are timeout timer, time wait timer, keep alive timer, and persistent timer. Introduction Various types of TCP timers are used to make sure that excessive delay in the transmission of data ...

Shivam Verma

Network Topologies

In networking, topology is the layout of a computer network, including how its nodes are connected to one another and communicate. Topologies can be either logical or physical. Nodes in topologies usually include devices like switches, routers, and software with switch and router features. A graph is a common way to represent network topologies. In network topology ...

Akshay Mishra

Manchester Encoding

Manchester code, commonly known as phase encoding, is a line code used in communications and data storage in which each data bit is encoded either high then low, or low then high for an equal period of time. The signal is self-clocking and has no DC component. As a result, galvanically isolating electrical connections using the Manchester code is ...

Trapti Gupta

Local Area Network (LAN) Technologies

LAN is a type of network which is used to connect devices within a limited area. LAN is limited to a building, church, school, or small geographical area. Ethernet and power over the Ethernet are the most popular LAN technologies used today. Cost efficiency, Installed base, Maintainability, and Performance are factors considered while selecting the ...

Akshay Mishra

Simple Network Management Protocol

The Simple Network Management Protocol (SNMP) in computer networks is an Internet Standard protocol for gathering, organizing, and altering information about managed devices on IP networks to affect the behavior of the devices. SNMP in computer networks is commonly supported by cable modems, routers, switches, servers, workstations, printers, and other devices.For network monitoring, SNMP is ...

Trapti Gupta

Challenge Response Authentication Mechanism

CRAM stands for Challenge Response Authentication Mechanism and it is a set of protocols used for authenticating a user by giving them a challenge and access is provided to the user only if they answer the challenges correctly.CAPTCHA is one example of Challenge Response Authentication. Introduction The Challenge Response Authentication mechanism is abbreviated as CRAM ...

Trapti Gupta

Active Directory Domain Services

An active directory is used for the management of computers and other devices on a network. Active Directory is a directory service that runs on Microsoft Windows Server. It is used for identification and also provides access management. Active Directory Domain Services (AD DS) is the most important component of Active Directory. The hierarchal structure ...

Neha Kumari

What is Traceroute?

Traceroute is the most preferred tool that network engineers make use of to troubleshoot networks. It was innovated in 1987 and remains extremely relevant these days. Traceroute may be a widely handed-down command-line benefit accessible in nearly all operating systems. It manifests you the entire route to a goal address. It also manifests the time ...

Trapti Gupta

Carrier Sense Multiple Access

In Carrier Sense Multiple Access (CSMA) protocol, the station will sense the channel before the transmission of data. CSMA reduces the chances of collision in the network but it does not eliminate the collision from the channel. 1-Persistent, Non-Persistent, P-Persistent, and O-Persistent are the three access methods of CSMA. What is Carrier Sense Multiple Access ...

Aman Kumar

Dynamic Trunking Protocol

Dynamic Trunking Protocol is a set of rules and properties that is used for carrying the traffic over the network when there is more than one VLAN (virtual local area network) in the network. This protocol was developed by the company named CISCO Systems. In the Dynamic Trunking Protocol, any interface can be set to ...