Articles for category: Computer Network

Trapti Gupta

TCP Sequence Number and Wrap Around Concept

TCP is a connection-oriented transport layer protocol. The TCP sequence number is a 32-bit number that helps in providing a sequence number that is suitable with other transmitting bytes of the TCP connection. TCP sequence number uniquely identifies each data byte as it is a stream-oriented protocol.Using a sequence number over and again for maintaining ...

Akshay Mishra

Cellular Network

A cellular network is a radio network spread out over land in the form of cells, each of which has a base station permanently installed. Together, these cells offer broader geographic radio coverage. Therefore, even when the user equipment (UE), like a mobile phone, is moving through cells during transmission, communication is still possible. In ...

Akshay Mishra

Data Compression with Arithmetic Coding

Lossless and lossy data compression methods both employ the arithmetic coding process often. The approach uses entropy encoding, where symbols that are seen more frequently require fewer bits to encode than symbols that are seen less frequently. Compared to popular approaches like Huffman coding, it offers several benefits. You will have a thorough knowledge of ...

Akshay Mishra

Service Set Identifier

A service set identifier’s main purpose is to distinguish one wireless local area network from another that might be simultaneously broadcasting in the same area. A basic service set (BSS), a network of connected clients and access points, and an extended service set cooperate with a service set identification.A basic service set is a subset ...

Saksham Arya

Difference between HTTP and FTP

HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) are the two internet protocols that are used to transfer data between a client and a server. Both of these protocols operate on the Application Layer of the OSI model. We also have a separate article OSI-Model where you can read about the OSI Model and ...

Sushant Gaurav

TCP Server-Client Implementation

The communication between different processes on the same nodes or different nodes in a network is done using the concept of a socket. A socket is a structure that allows communication between processes (of the same or different machines) i.e. sending and receiving data over a network. A socket works with the port number associated ...

Akshay Mishra

VRRP Protocol

Virtual Router Redundancy Protocol (VRRP) or VRRP protocol for IPv6 can be configured for Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces. VRRP protocol allows hosts on a LAN to utilize redundant routing platforms on that LAN with only the static configuration of a single default route on the hosts being necessary. The ...

Akshay Mishra

Adding Security to Routing Protocols

The optimum route between the source and destination networks is found during the routing process by a layer 3 device (either a router or a layer 3 switch). Dynamic routing protocols are used to reduce administrator workload, i.e., administrators need to set up less, however by default, all routing information is exposed to all interested ...

Trapti Gupta

Context-based Access Control

Context Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall and filtering of traffic is performed by it at the different OSI model layers. Traffic Filtering, Traffic Examine, Intrusion Prevention, and alert and audit traits are done by the CBAC. Introduction Context Based ...

Gaurav Kr Roy

Types of Network Topologies

Networking has become an essential component of cybersecurity & all of the daily activities we perform while communicating with the internet. Any communication network our phone or system lies in follows or comes under a structure called the topology. This article will discuss network topologies, their types, and troubleshooting topologies with software. What is Network ...