Tag Archives | Networking

7 Layers of OSI Reference Model (With Diagram) | Networking |Computer Science

The seven layers identified by ISO in the OSI reference model from bottom to top are: 1. Physical Layer 2. Data Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application Layer. The physical layer is concerned with transmission of data through communication channels, these communication channels do not themselves form part of the [...]

By |2017-03-15T04:26:12+05:30March 15, 2017|Networking|Comments Off on 7 Layers of OSI Reference Model (With Diagram) | Networking |Computer Science

Top 6 Methods of Data Transmission | Data Communication | Computer Science

This article throws light upon the top six methods of data transmission. The methods are: 1. Twisted Pair 2. Shielded Twisted Pair 3. Baseband Coaxial Cable 4. Broadband Coaxial Cable 5. Fibre Optics 6. IEEE Standards. Method # 1. Twisted Pair: As must be obvious from the example, transferring data by copying it onto magnetic tape or floppy disk or [...]

By |2017-03-15T04:26:55+05:30March 15, 2017|Data Communication|Comments Off on Top 6 Methods of Data Transmission | Data Communication | Computer Science

SMDS Offered by Telephone Companies | Data Communication | Networking

SMDS or Switched Multimegabit Data Service is another service being offered by telephone companies in many countries. This service, which had become popular in the USA in the 90s, was developed by Bellcore in 1980. Figure 6.6 indicates how normal leased line connections can be established between some LANs. Telephones: Other Issues: Other telephone services include items, such as Synchronous [...]

By |2017-03-15T04:31:30+05:30March 15, 2017|Networking|Comments Off on SMDS Offered by Telephone Companies | Data Communication | Networking

Categories of Encryption Methods | Networking | Computers

Encryption methods have historically been of two categories, namely, substitution ciphers and trans­position ciphers. We discuss them below. Category # 1. Substitution Ciphers: While the above would be a simple method of coding—based on the belief that the enemy could not decipher the Navajo tongue—variations of this method was used in substitution ciphers. In this method (sometimes known as a [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Encryption|Comments Off on Categories of Encryption Methods | Networking | Computers

Use of Bridges in LAN | Networking | Computer Science

After reading this article you will learn about the use of bridges in LAN. Organisations that use multiple LANs and of different designs generally need to connect them to each other. They do this by using bridges. Bridges operate in the data link layer. This means that bridges do not examine the network layer header and can, therefore, copy IP, [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Networking|Comments Off on Use of Bridges in LAN | Networking | Computer Science

Why Congestion is Caused ? | Networking | Computers

There are several reasons why congestion is caused. For example, if a stream of packets begin arriving on some of the input lines and all need to be sent on the same output line a queue will build up. If there is not enough memory to store all of them, packets will start to get lost. Adding more memory may [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Networking|Comments Off on Why Congestion is Caused ? | Networking | Computers

Principles of Congestion Control | Networking | Computer Science

After reading this article you will learn about the principles of congestion control. A subnet may be a complex system and the solution to congestion control in a subnet may be treated as a control problem. The control problem may be either open loop or closed loop. Both have different approaches to the problem. Control system specialists will be familiar [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Networking|Comments Off on Principles of Congestion Control | Networking | Computer Science

Routing: Function and Requirement | Networking | Computers

After reading this article you will learn about the function and requirement of routing. Function of Routing: The function of a router is to switch messages. Router, which is a generic term used in Wide Area Net­works, aids in transferring messages. Routers are specialised computers used to connect two or more transmission lines. When data arrives on an incoming line [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Networking|Comments Off on Routing: Function and Requirement | Networking | Computers

4 Main Strategies Used in Routing | Networking | Computers

Although there are a large number of routing strategies that have been proposed and are being used, most routing strategies have evolved from the requirements of packet-switching networks. These are basically four strategies that have been used in routing: 1. Fixed Routing 2. Flooding 3. Random Routing 4. Adaptive Routing. 1. Fixed Routing: A single permanent route is configured and [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Networking|Comments Off on 4 Main Strategies Used in Routing | Networking | Computers

2 Popular Routing Algorithms | Networking | Computer Science

After reading this article you will learn about the two popular routing algorithms: 1. Dijkstra's Algorithm 2. Bellman-Ford Algorithm. 1. Dijkstra's Algorithm: Almost all packet-switching networks base their routing on some form of packet-switching network. Most least-cost algorithms in use in packet-switching networks and in the internet are variations of either Dijkstra's Algorithm or the Bellman-Ford Algorithm. In Dijkstra's Algorithm, [...]

By |2017-03-15T04:26:11+05:30March 15, 2017|Networking|Comments Off on 2 Popular Routing Algorithms | Networking | Computer Science
Go to Top