Skip to content

Category Archives: Computer Networks

Communication systems use analog signals for communication purposes and these signals tend to deteriorate while traveling through transmission medium because of attenuation, distortion, and noise.… Read More
AFTP (Anonymous File Transfer Protocol) is a network protocol used for transmitting files using TCP-based networks. Anonymous file transfer protocol lets a user move files… Read More
In Default VLAN all switch ports turn into a member of the default VLAN just after the initial bootup of the switch. All these ports… Read More
A network protocol is an accepted set of rules that govern data communication between different devices in the network. It determines what is being communicated,… Read More
A loopback address is a distinct reserved IP address range that starts from 127.0.0.0 ends at 127.255.255.255 though 127.255.255.255 is the broadcast address for 127.0.0.0/8.… Read More
OSI (Open Systems Interconnection) model is a reference model that describes the movement of information between software applications in different computer systems. It is a… Read More
Frame Check Sequence (FCS) refers to extra bits added to the frame for error detection. It is used for HDLC error detection. It is 2… Read More
CDP is a Layer 2 protocol used by Cisco devices; it is used for discovering other directly connected Cisco devices in a network, This allows… Read More
Switching is a technique that is used to transmit data between the networks. It is achieved by using switches that are used to connect multiple… Read More
Packet filtering firewalls check the source and destination IP addresses, protocols(User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)), and port addresses as well. If… Read More
VLAN Trunking Protocol is a Cisco proprietary protocol used for communicating VLAN information by Cisco switches. Through VTP, the user can synchronize VLAN name, VLAN… Read More
A Firewall is a Security Product, whose main function is to filter out unauthorized and malicious traffic and they run between trusted and untrusted networks… Read More
The full form of VPN is Virtual Private Network, When different nodes or computers are grouped together to form a private network on a public… Read More
Optical Fiber Cables are based on the idea that light can be confined within a bent glass rod by total internal reflection. Nowadays, optical fibers… Read More
A computer network uses two types of IP addresses:  1. Public IP / External IP: A Public IP is an IP address that your residence… Read More

Start Your Coding Journey Now!