Computer Engineering Articles

Page 2 of 35

What is ad-hoc network?

Moumita
Moumita
Updated on 01-Nov-2023 60K+ Views

An ad hoc network is one that is spontaneously formed when devices connect and communicate with each other. The term ad hoc is a Latin word that literally means "for this, " implying improvised or impromptu.Ad hoc networks are mostly wireless local area networks (WLANs). The devices communicate with each other directly instead of relying on a base station or access points as in wireless LANs for data transfer co-ordination. Each device participates in routing activity, by determining the route using the routing algorithm and forwarding data to other devices via this route.Classifications of Ad Hoc NetworksAd hoc networks can ...

Read More

Difference between Router and Switch

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 01-Nov-2023 45K+ Views

Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ...

Read More

What is Hamming Distance?

Nitya Raut
Nitya Raut
Updated on 01-Nov-2023 79K+ Views

Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ...

Read More

Medium Access Control Sublayer (MAC sublayer)

Samual Sam
Samual Sam
Updated on 31-Oct-2023 105K+ Views

The medium access control (MAC) is a sublayer of the data link layer of the open system interconnections (OSI) reference model for data transmission. It is responsible for flow control and multiplexing for transmission medium. It controls the transmission of data packets via remotely shared channels. It sends data over the network interface card. MAC Layer in the OSI Model The Open System Interconnections (OSI) model is a layered networking framework that conceptualizes how communications should be done between heterogeneous systems. The data link layer is the second lowest layer. It is divided into two sublayers − ...

Read More

How to Convert Decimal to Hexadecimal?

Arjun Thakur
Arjun Thakur
Updated on 31-Oct-2023 64K+ Views

Decimal system is most familiar number system to the general public. It is base 10 which has only 10 symbols − 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. Whereas Hexadecimal system is most familiar number system color representation in Computers or digital systems. It is base 16 which has only 16 symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and A, B, C, D, E, F. These A, B, C, D, E, F use as single digit in place of double digits, 10, 11, 12, 13, 14, 15 respectively.Conversion from Decimal to Hexadecimal ...

Read More

Wide Area Network (WAN)

Rishi Raj
Rishi Raj
Updated on 31-Oct-2023 25K+ Views

A wide area network (WAN) is a computer network that covers a large geographical area comprising a region, a country, a continent or even the whole world. WAN includes the technologies to transmit data, image, audio and video information over long distances and among different LANs and MANs.The distinguishing features of WAN areWANs have a large capacity, connecting a large number of computers over a large area, and are inherently scalable.They facilitate the sharing of regional resources.They provide uplinks for connecting LANs and MANs to the Internet.Communication links are provided by public carriers like telephone networks, network providers, cable systems, ...

Read More

Cut Set and Cut Vertex of Graph

Mahesh Parahar
Mahesh Parahar
Updated on 22-Oct-2023 47K+ Views

Whether it is possible to traverse a graph from one vertex to another is determined by how a graph is connected. Connectivity is a basic concept in Graph Theory. Connectivity defines whether a graph is connected or disconnected.ConnectivityA graph is said to be connected if there is a path between every pair of vertex. From every vertex to any other vertex, there should be some path to traverse. That is called the connectivity of a graph. A graph with multiple disconnected vertices and edges is said to be disconnected.Cut VertexLet 'G' be a connected graph. A vertex V ∈ G ...

Read More

Fiber Distributed Data Interface (FDDI)

Moumita
Moumita
Updated on 22-Oct-2023 35K+ Views

Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for transmission of data in local area network (LAN) over fiber optic cables. It is applicable in large LANs that can extend up to 200 kilometers in diameter. Features FDDI uses optical fiber as its physical medium. It operates in the physical and medium access control (MAC layer) of the Open Systems Interconnection (OSI) network model. It provides high ...

Read More

Multiple Access Protocols in Computer Networks

Moumita
Moumita
Updated on 22-Oct-2023 39K+ Views

Multiple access protocols are a set of protocols operating in the Medium Access Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI) model. These protocols allow a number of nodes or users to access a shared network channel. Several data streams originating from several nodes are transferred through the multi-point transmission channel. The objectives of multiple access protocols are optimization of transmission time, minimization of collisions and avoidance of crosstalks. Categories of Multiple Access Protocols Multiple access protocols can be broadly classified into three categories - random access protocols, controlled access protocols and channelization protocols. ...

Read More

Difference between Private and Public IP addresses

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 14-Sep-2023 27K+ Views

What is an IP Address? An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address is used for two purposes: identifying a host or network interface, and addressing a specific location. An IP address has two primary functions: it identifies the host, or more particularly its network interface; and it indicates the host's position in the network, allowing a path to be established to that host. IP addresses can be either Public or Private. Read through this article to ...

Read More
Showing 11–20 of 349 articles
« Prev 1 2 3 4 5 35 Next »
Advertisements