Articles for category: Computer Network

Sushant Gaurav

P2P(Peer To Peer) File Sharing

Peer-to-peer has decentralized the simplest form of network architecture where every computer system can communicate with every other computer system. In the peer-to-peer network, each node of the network has equal permission and responsibility for processing the data or information. Each computer network in the peer-to-peer computer network architecture acts as an independent workstation and ...

Agam Jyot Singh

Hot Standby Router Protocol

The Hot Standby Router Protocol (HSRP) makes sure that when access circuits or network edge devices have first-hop failures, user traffic is instantly and transparently restored. With HSRP, you can set up two or more routers as standby routers and just one router as active at once. The Hot Standby Router Protocol (HSRP) allows devices ...

Priyanshu Pandey

Difference between Ping and Traceroute

In computer networks, the data between sender and receiver is transferred in small units or blocks known as packets. Each packet is transmitted separately and may take a different path to reach its destination. Once all of these packets of the original message arrive at their destination, they are reassembled to form the original message. ...

Sindhuja Gudala

Route Poisoning and Count to Infinity Problem

This article explains the Route Poisoning and Count to infinity problem which is caused by the routing loop (A network problem in which packets continue to be routed in an endless circle) in the Distance Vector Routing (DVR) network protocol. The Distance Vector Routing protocol acquires information/ packets from its neighbor routers/nodes to reach the ...

Sushant Gaurav

TCP Server-Client Implementation

The communication between different processes on the same nodes or different nodes in a network is done using the concept of a socket. A socket is a structure that allows communication between processes (of the same or different machines) i.e. sending and receiving data over a network. A socket works with the port number associated ...

Priyanshu Pandey

Differences Between Virtual Circuits & Datagram Networks

Virtual Circuits are also known as connection-oriented switching. Virtual circuit switching establishes a predetermined path before messages are sent. In contrast, a datagram is a packet-switching technique in which each packet, known as a datagram, is treated as a separate entity. Each packet carries destination information, which the switch uses to route the packet to ...

Akshay Mishra

Telnet in Computer Networks

TELNET is an acronym for TErminaL-NETwork. It is a form of protocol that makes it possible for one computer to connect to a nearby computer. It is employed as a common TCP/IP protocol for the virtual terminal service provided by ISO. The local computer is the one that establishes the connection. A remote computer is ...

Aditya Saxena

Program for IP Forwarding Table Lookup

There exists a routing table in the Unix operating system consisting of several tuples that contain the I.P. (Internet Protocol) address of the network, the subnet mask, the IP address of the gateway, and the name of the interface. This information is required for forwarding packets to the exterior of the network for connecting to ...

Trapti Gupta

Multiplexing and Demultiplexing in Computer Networks

The process of multiplexing involves selecting an input line from the ‘n’ input lines and transmitting that selected line to the output line. The multiplexer is a device used for performing multiplexing. The demultiplexer is used for demultiplexing. And the demultiplexing process is just the reverse of the multiplexing process. Multiplexers and Demultiplexers are abbreviated ...

Trapti Gupta

Piggybacking in Computer Networks

Piggybacking is a process of attaching acknowledgment with the data packet to be sent. It is an efficient solution for reducing the bandwidth utilization of the network. TCP is a full-duplex communication protocol, so piggybacking is used to transmit packets. Introduction to Piggybacking Piggybacking is a process of attaching the acknowledgment with the data packet ...