Articles for category: Computer Network

Akshay Mishra

Service Set Identifier

A service set identifier’s main purpose is to distinguish one wireless local area network from another that might be simultaneously broadcasting in the same area. A basic service set (BSS), a network of connected clients and access points, and an extended service set cooperate with a service set identification.A basic service set is a subset ...

Saksham Arya

Difference between HTTP and FTP

HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) are the two internet protocols that are used to transfer data between a client and a server. Both of these protocols operate on the Application Layer of the OSI model. We also have a separate article OSI-Model where you can read about the OSI Model and ...

Priyanshu Pandey

Virtual LAN

A VLAN or Virtual Local Area Network is a customized network built from one or more local area networks. It allows a group of devices from different networks to be integrated into a single logical network. As a result, a virtual LAN is created that can be managed just like a physical LAN. Without VLANs, ...

Trapti Gupta

Spanning Tree Protocol

Spanning Tree protocol is a link management protocol. It is used for creating a loop-free network. It is also a layer-2 protocol that runs on bridges and switches. In IEEE standard, it is standardized as IEEE 802.1D. Introduction What is STP? STP is a link management protocol and also a layer 2 protocol. STP generally ...

Priyanshu Pandey

Fragmentation in Networking

Fragmentation is a process that divides packets into smaller pieces (fragments) so that the resulting pieces can travel across a link with a smaller maximum transmission unit (MTU) than the original packet size. The network layer fragments data when the maximum size of a datagram exceeds the maximum size of data that can be retained ...

Priyanshu Pandey

LiFi vs WiFi

WiFi stands for Wireless Fidelity, while LiFi stands for Light Fidelity. LiFi and WiFi are both primarily utilized for internet-based applications. LiFi employs light as a medium for data transmission, whereas WiFi uses electromagnetic waves at various radio frequencies. Light experiences less interference than radio waves and can therefore be employed in settings with greater ...

Saksham Arya

Collision Domain and Broadcast Domain

To analyze the working and efficiency of the network devices, various metrics (a metric is defined as a standard or system of measurement) are used. The collision domain and the broadcast domain are two of those metrics. A collision domain is measured by finding out the number of devices whose signals collides with each other ...

Aditya Saxena

Diffie-Hellman Algorithm Implementation

The Diffie-Hellman Algorithm is a secure way of cryptographic keys exchange across a public channel. It was among the very first public-key protocols. Ralph Merkle came up with the Diffie-hellman key exchange and it was named after Whitfield Diffie and Martin Hellman. Within the fields of cryptography, DH (Diffie-Hellman) is the earliest example of public ...

Akshay Mishra

Token Ring Protocol

A communication protocol used in local area networks is called the Token Ring protocol (LAN). The topology of the network determines the sequence in which stations send in a token ring protocol. A single ring of connections connects all of the stations. It makes use of a unique three-byte frame known as a “token” that ...

Priyanshu Pandey

Difference between HTML and HTTP

HTML (Hyper Text Markup Language) and HTTP (Hypertext Transfer Protocol) are two completely distinct technologies. HTTP is an application protocol that governs how information travels on the World Wide Web, whereas HTML governs how Web pages are formatted and displayed. HTTP protocol determines how Web data is moved around the internet, whereas HTML is the ...