• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Computer Networking

Radio Wave – What is a Radio Wave Transmission?.

By Dinesh Thakur

Radio waves, also called radio waves as they were discovered by German physicist Heinrich Hertz in 1888, are electromagnetic waves, that is to say the combined oscillation of an electric field and a magnetic field. Radio waves, infrared, visible light, ultraviolet, X-rays or gamma rays are all examples of electromagnetic waves. [Read more…] about Radio Wave – What is a Radio Wave Transmission?.

Transmission System – What is an Transmission System?

By Dinesh Thakur

Data transmission can be divided into parallel and serial data transmission. [Read more…] about Transmission System – What is an Transmission System?

Data Communication Software

By Dinesh Thakur

Now, in wider sense we may understand that a transmitter or sender may be a terminal (computer) responsible for with communication and application software controls the terminal and processes data. There may be more than one terminal connected to the sender. [Read more…] about Data Communication Software

Frequency Shift Keying (FSK)

By Dinesh Thakur

In “frequency shift keying (FSK)”, the frequency of a sinusoidal carrier is shifted between two discrete values. One of these frequencies (f1) represents a binary “1” and the other value (f0) represents a binary “0”. The representation of digital data using FSK is as shown in Fig. Note that there is no change in the amplitude of the carrier. [Read more…] about Frequency Shift Keying (FSK)

Amplitude Shift Keying (ASK)

By Dinesh Thakur

Amplitude Shift Keying (ASK) is the simplest type of digital CW modulation. Here the carrier is a sinewave of frequency fc. We can represent the carrier signal mathematically as follows: [Read more…] about Amplitude Shift Keying (ASK)

Multicasting – What is Multicasting?

By Dinesh Thakur

The broadcast systems generally allow the possibility of addressing a packet to all destinations by using a special code in the address field. When a packet with this code is transmitted then it is received and processed by every machine on the network. This mode is called broadcasting. [Read more…] about Multicasting – What is Multicasting?

Buffering – What is Buffering in Internet?

By Dinesh Thakur

When data is sent to the receiver, flow control should be carried out so that the flow of data does not overwhelm the receiver. Any receiving device has a limited speed at which it can process the incoming data and a limited amount of memory to store the incoming data. The receiving device should be able to inform the sending device before these limits are reached so that the transmission is stopped or reduced, temporarily. [Read more…] about Buffering – What is Buffering in Internet?

Frame Relay – What is Frame Relay?

By Dinesh Thakur

Frame Relay (frame relay) is a packet switching technology that fragmented into transmission units called frames and sent in high-speed bursts through a digital network. Establishes an exclusive connection during the transmission period called virtual connection. [Read more…] about Frame Relay – What is Frame Relay?

X.25 – What is X.25 Networks?

By Dinesh Thakur

• X.25 is a standard used by many older public networks specially outside the U.S.
• This was developed in 1970s by CCITT for providing an interface between public packet-switched network and their customers.
• The packet switching networks use X.25 protocol. The X.25 recommendations were first prepared in1976 and then revised in1978,1980 and 1984. [Read more…] about X.25 – What is X.25 Networks?

What is Switched Multimegabit Data Service (SMDS)? Advantages & Disadvantages of SMDS

By Dinesh Thakur

The Multimegabit Data Switching Service (SMDS) is not a protocol, but rather a “metropolitan area service (MAN).” In essence, it is a method of transmitting ATM cells (Asynchronous Transfer Mode) through a shared bus. First used in 1992, it obtained its support when the Regional Bell Operating Companies (RBOC) and other local communication service providers (LEC) began to feel competitive pressure from long-distance communication companies (IXC) in local markets and considered that the best defense against competition was a high-speed data transmission system. SMDS, thanks to its relatively low cost and high-speed data switching service, seemed the perfect solution and many of the LECs in large metropolitan areas began offering the service. [Read more…] about What is Switched Multimegabit Data Service (SMDS)? Advantages & Disadvantages of SMDS

ARPANET – What is ARPANET?

By Dinesh Thakur

This may be considered as the breakthrough for many of current ideas, algorithms and Internet technologies. It started Paul Baran in 1960s funded by Advanced Research Projects Agency (ARPA), an organization of the united States Defense Department and, therefore, named as Advanced Research Projects Agency Network (ARPANET) predecessor of the modern Internet. It was world’s first fully operational packet switching computer network and the world’s first successful computer network to implement the TCP/IP reference model that was used earlier by ARPANET, before being used in the Internet. The ARPANET is the first network that planed the seed of interent.
[Read more…] about ARPANET – What is ARPANET?

What is a Wide Area Network (WAN)? – Difference between WAN and LAN

By Dinesh Thakur

In today’s modern telecommunications, the need to expand networks is rapidly growing. While a LAN can cover most communication and resource sharing needs within a campus or company, WAN connectivity allows users and organizations to take more significant advantage of services such as the Internet, e-commerce, and videoconferencing. [Read more…] about What is a Wide Area Network (WAN)? – Difference between WAN and LAN

What is LAN (Local Area Network) | Definition of LAN

By Dinesh Thakur

What is lan: It is a privately-owned network and stands for local area network. A network is a group of computers and other devices connected so they can pass information back and forth. The local area network (LAN) is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings up to a few kilometers in size. LANs very widely used in a variety of computers to share resources (e.g., printers) and exchange information. [Read more…] about What is LAN (Local Area Network) | Definition of LAN

Types of Transmission Technology

By Dinesh Thakur

The transmission means, is that sending a signal from one location to another. Transmission technologies refer to the physical layer protocol such as modulation, demodulation, line coding, error control etc. The transmission technology can be categorized broadly into two types: [Read more…] about Types of Transmission Technology

TFTP – Trivial File Transfer Protocol (TFTP)

By Dinesh Thakur

• Trivial file transfer protocol (TFTP) is suited for those applications that do not require complex procedures of FTP and do not have enough resources (RAM, ROM) for this purpose. [Read more…] about TFTP – Trivial File Transfer Protocol (TFTP)

SIP- What is the Session Initiation Protocol (SIP)?

By Dinesh Thakur

• Session Initiation Protocol (SIP) was designed by IETF and is described in RFC 3261. [Read more…] about SIP- What is the Session Initiation Protocol (SIP)?

HTTP Cookie – What is the HTTP cookie?

By Dinesh Thakur

• Cookie is a special header sent by the server to the client or browser. [Read more…] about HTTP Cookie – What is the HTTP cookie?

WWW Defined – What is the World Wide Web (WWW)?

By Dinesh Thakur

The WWW is the brainchild of Tim Berners Lee a CERN who had the idea of creating an electronic web of research information. The web is currently the fastest growing Internet information system, with new resources being added regularly. The web relies on a set of protocols, conventions and software to operate. The web is a distributed system of delivering linked documents over the Internet. [Read more…] about WWW Defined – What is the World Wide Web (WWW)?

Digital Signatures- What is Digital Signatures?

By Dinesh Thakur

• Signature is the proof to the receiver that the document comes from the correct entity. The person who signs it takes the responsibility of the content present in the document. [Read more…] about Digital Signatures- What is Digital Signatures?

Message Authentication- What is Message Authentication?

By Dinesh Thakur

• Message authentication ensures that the message has been sent by a genuine identity and not by an imposter. [Read more…] about Message Authentication- What is Message Authentication?

SHA-1 – What is Secure Hash Algorithm-l (SHA-1)?

By Dinesh Thakur

• Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA). [Read more…] about SHA-1 – What is Secure Hash Algorithm-l (SHA-1)?

MD5 – What is Message Digest 5 (MD5)?

By Dinesh Thakur

• There are a number of popular message digest algorithms known as MDn for various values of n. [Read more…] about MD5 – What is Message Digest 5 (MD5)?

Cryptography – What is Cryptography?

By Dinesh Thakur

• Cryptography is a technique to provide message confidentiality.

• The term cryptography is a Greek word which means “secret writing”. [Read more…] about Cryptography – What is Cryptography?

Network Security Services– What is Network Security Services?

By Dinesh Thakur

Network security can provide the following services related to a message and entity. [Read more…] about Network Security Services– What is Network Security Services?

Network Security – What is Network Security Threats?

By Dinesh Thakur

• Computer Security means to protect information. It deals with prevention and detection of unauthorized actions by users of a computer. [Read more…] about Network Security – What is Network Security Threats?

Flooding – What is flooding?

By Dinesh Thakur

Flooding is the static routing algorithm. In this algorithm, every incoming packet is sent on all outgoing lines except the line on which it has arrived.

One major problem of this algorithm is that it generates a large number of duplicate packets on the network.

Several measures are takes to stop the duplication of packets. These are:

1. One solution is to include a hop counter in the header of each packet. This counter is decremented at each hop along the path. When this counter reaches zero the packet is discarded. Ideally, the hop counter should become zero at the destination hop, indicating that there are no more intermediate hops and destination is reached. This requires the knowledge of exact number of hops from a source to destination.

2. Another technique is to keep the track of the packed that have been flooded, to avoid sending them a second time. For this, the source router put a sequence number in each packet it receives from its hosts. Each router then needs a list per source router telling which sequence numbers originating at that source have already been seen. If an incoming packet is on the list, it is not flooded.

3. Another solution is to use selective flooding. In selective flooding the routers do not send every incoming packet out on every output line. Instead packet is sent only on those lines which are approximately going in the right direction.

Tunneling – What is Tunneling?

By Dinesh Thakur

• Tunneling is an internetworking strategy that is used when source and destination networks of same type are connected through a network of different type. [Read more…] about Tunneling – What is Tunneling?

Quality of Service (QOS)

By Dinesh Thakur

The notion of quality of service, or QoS, concerns certain characteristics of a network connection under the sole of the network service provider liability.

A QoS value applies to the whole of a network connection. It must be identical at both ends of the connection, even if it is supported by several interconnected subnetworks each offering different services.

QoS is described by parameters. Defining a QoS parameter indicates how to measure or determine its value, mentioning if necessary the events specified by the network service primitives.

Two types of QoS parameters have been defined:

• Those whose values are transmitted peer users via the Network service during the establishment phase of the network connection. During this transmission, a tripartite negotiation can take place between users and the network service provider to define a value for the QoS parameters.

• Those whose values are transmitted or negotiated between users and network service provider. For these QoS parameters, it is possible to obtain, by local means, information on the value to the supplier and values to each user of the network service.

The main QoS parameters are:

• Time of establishment of the network connection. Is the time that elapses between a network connection request and confirmation of the connection? This QoS parameter indicates the maximum time acceptable to the user.

• Probability of failure of the establishment of the network connection. This probability is established from the applications which have not been met in the normal time limit for establishing the connection.

• Flow data transfer. The flow rate defines the number of bytes transported over a network connection in a reasonably long time (a few minutes, a few hours or days). The difficulty in determining the speed of a connection network comes from the asynchronous transport packets. To obtain a value acceptable, observe the network on a sequence of several packages and consider number of bytes of data transported taking into account the elapsed time since the application or the data transfer indication.

• Transit time when transferring data. The transit time corresponds to elapsed time between a data transfer request and indicating transfer of data. This transit time is difficult to calculate because of the geographical distribution ends. The satisfaction of a quality service on the transit time may moreover contradict flow control.

• Residual error rate. Is calculated from the number of packets that arrive erroneous, lost or duplicated on the total number of transmitted packets. It is a rate Error packet. Also denotes the probability that a packet does not arrive correctly to the receiver.

• Transfer Probability incident. Is obtained by the ratio of the number of incidents listed on the total number of transfer taken. To have a correct estimate of this probability, just consider the number of network disconnection relative to the number of transfer taken.

• Probability of failure of the network connection. Is calculated from the number of release and resetting of a network connection based on the number of transfer made.

• Release time the network connection. This is the maximum acceptable delay between a disconnection request and the actual release.

• Probability of failure upon release of the network connection. The number Liberation of failure required by the total number requested release.

The following three additional parameters used to characterize the quality of Service:

• Protection of the network connection. Determines the probability that the network connection be in working order throughout the period when it is opened by the user. There is ways to protect a connection by duplicating or having a Backup connection ready to be opened in case of failure. The value for a telephone network is 99.999%, the so-called five nines, equivalent to a few minutes of downtime per year. The protection is much lower for an IP network, with a value of the order of 99.9%, three or nine. This value arises besides problem for IP telephony, which requires stronger protection telephone connections.

• Priority of the network connection. Determines priority of access to a connection network, the holding priority of a network connection and priority of data connection.

• Maximum acceptable cost. Determines if the network connection is tolerable or not. The definition of the cost is quite complex since it depends on the use of resources for the establishment, maintenance and release of the connection network.

Flow Characteristics

Traditionally, four types of characteristics are attributed to a flow: reliability, delay, jitter and bandwidth.

Reliability

•   Reliability is an important characteristic of flow.

• Lack of reliability means losing a packet or acknowledgement which then requires retransmission.

•   However, the sensitivity of application programs to reliability is not the same. For example, it is more important that electronic mail, file transfer, and internet access have reliable transmissions than audio conferencing or telephony.

Delay

• Source to destination delay is another flow characteristic.

• Applications can tolerate delay in different degrees.

• In this case, telephony, audio conferencing, video conferencing and remote log in need minimum delay while delay in file transfer or e-mail is less important.

Jitter

• Jitter is defined as the variation in delay for packets belonging to the same flow.

• High Jitter means the difference between delays is large and low jitter means the variation is small.

• For example, if four packets depart at times 0, 1,2,3 and arrive at 20, 21,22, 23, all have same delay, 20 units of time. On the other hand, if the above four packets arrive at 21,23,21, and 28 they will have different delays of21, 22, 19 and 24.

Bandwidth

• Different applications need different bandwidths.

• In video conferencing we need to send million of bits per second to refresh a colour screen while the total number of bits in an email may not reach even a million.



DVMRP – What is DVMRP (Distance Vector Multicast Routing Protocol)?

By Dinesh Thakur

• The distance vector multicast routing protocol is multicast routing protocol that takes the routing decision based upon the source address of the packet. [Read more…] about DVMRP – What is DVMRP (Distance Vector Multicast Routing Protocol)?

IGMP – What is Internet Group Management Protocol (IGMP)?

By Dinesh Thakur

• Internet Group Management Protocol is a group management protocol that mainly manages the group membership in a multicast network. [Read more…] about IGMP – What is Internet Group Management Protocol (IGMP)?

« Previous Page
Next Page »

Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW