Articles for category: Computer Network

Akshay Mishra

Cellular Network

A cellular network is a radio network spread out over land in the form of cells, each of which has a base station permanently installed. Together, these cells offer broader geographic radio coverage. Therefore, even when the user equipment (UE), like a mobile phone, is moving through cells during transmission, communication is still possible. In ...

Akshay Mishra

Data Compression with Arithmetic Coding

Lossless and lossy data compression methods both employ the arithmetic coding process often. The approach uses entropy encoding, where symbols that are seen more frequently require fewer bits to encode than symbols that are seen less frequently. Compared to popular approaches like Huffman coding, it offers several benefits. You will have a thorough knowledge of ...

Akshay Mishra

Service Set Identifier

A service set identifier’s main purpose is to distinguish one wireless local area network from another that might be simultaneously broadcasting in the same area. A basic service set (BSS), a network of connected clients and access points, and an extended service set cooperate with a service set identification.A basic service set is a subset ...

Saksham Arya

Difference between HTTP and FTP

HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) are the two internet protocols that are used to transfer data between a client and a server. Both of these protocols operate on the Application Layer of the OSI model. We also have a separate article OSI-Model where you can read about the OSI Model and ...

Priyanshu Pandey

Virtual LAN

A VLAN or Virtual Local Area Network is a customized network built from one or more local area networks. It allows a group of devices from different networks to be integrated into a single logical network. As a result, a virtual LAN is created that can be managed just like a physical LAN. Without VLANs, ...

Neha Kumari

TACACS+

Terminal Access Controller Access-Control System (TACACS) refers to a family of connected protocols handling remote authentication and connected services for network access management through a centralized server. The initial TACACS protocol, which dates back to 1984, was utilized for communicating with an authentication server, common in older UNIX networks or other operating systems as well ...

Sindhuja Gudala

Packet Flow in the Same Network

For transferring a packet from the source host to the destination host in the network we require both the MAC and IP address of the destination host. ARP (Address Resolution Protocol) is a protocol from the second layer i.e, the Data link layer in the OSI model that connects a dynamic Internet Protocol (IP) address ...

Sushant Gaurav

Frequency Division and Time Division Multiplexing

The signal transmission over various channels can be performed in two different ways namely – Frequency division and Time division multiplexing. In frequency division multiplexing, we transfer many signals at the same time and each source transmits its signals in its allocated range of frequency. In the time division multiplexing, the transmission time is divided ...

Piyush Singhal

Data Link Layer in OSI Model

What is the Data Link Layer Protocol? Some Common Data Link Protocols are: Functions of Data Link Layer 1) Framing and Link Access 2) Reliable Delivery The Data Link Layer provides a guaranteed delivery service, i.e., it transmits network layer datagrams without error. Transmissions and acknowledgments are used to provide a reliable delivery service. A data ...

Priyanshu Pandey

LiFi vs WiFi

WiFi stands for Wireless Fidelity, while LiFi stands for Light Fidelity. LiFi and WiFi are both primarily utilized for internet-based applications. LiFi employs light as a medium for data transmission, whereas WiFi uses electromagnetic waves at various radio frequencies. Light experiences less interference than radio waves and can therefore be employed in settings with greater ...