Found 1515 Articles for Computer Network

Difference between Client-Server and Peer-to-Peer Network

Kiran Kumar Panigrahi
Updated on 22-Aug-2022 14:36:50

4K+ Views

Both Client-Server and Peer-to-Peer networks transfer data from a source to a destination with minimal loss in transmission. Both these networks establish a communication channel through which data transmission takes place, however the channel remains dedicated in case of a Client-Server network, which is not the case with Peer-to-Peer networks.Read through this article to find out how client-server networks differ from peer-to-peer networks.What is a Client-Server Network?The client-server paradigm is a network process communication structure that connects service requestors, clients, and providers. A network or the Internet is used to connect the client and the server.The client-server approach, which also ... Read More

Difference between Circuit switching and Message switching

Kiran Kumar Panigrahi
Updated on 10-Aug-2022 08:23:03

2K+ Views

Circuit switching and Message switching are both telecommunication techniques that are used to transfer data from a source to a destination with minimal loss in transmission.Circuit switching is a way of constructing a dedicated network in which two network nodes create a dedicated communications channel before connecting. In message switching, the source and destination nodes are not connected; the intermediate nodes are in charge of data transfer.Read through this article to find out more about Circuit switching and Message switching and how they are different from each other.What is Circuit Switching?In circuit switching, networks create dedicated transmission channels. While other ... Read More

Difference between DES and AES ciphers

Nitin Sharma
Updated on 09-Jun-2020 08:26:35

511 Views

As we know that both DES and AES are the type of symmetric key block cipher which are used in such encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Now on the basis of characteristics we can distinguish between AES and DES.Following are the important differences between DES and AES ciphers.Sr. No.KeyDES CipherAES Cipher1DefinitionData Encryption Standard also known as DES is a symmetric key block cipher that was introduced in the ... Read More

Difference between Synchronous and Asynchronous Counter

Kiran Kumar Panigrahi
Updated on 22-Aug-2022 14:20:11

9K+ Views

In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can be grouped into two categories: Synchronous counters and Asynchronous counters.Read through this article to find out how these two types of counters function and how they are different from each other.What is a Synchronous Counter?If the "clock" pulses are applied to all the flip-flops in a counter simultaneously, then such ... Read More

The Bluetooth Protocol Stack

Moumita
Updated on 22-Oct-2023 02:32:25

39K+ Views

Bluetooth network technology connects mobile devices wirelessly over a short-range to form a personal area network (PAN). The Bluetooth architecture has its own independent model with a stack of protocols, instead of following the standard OSI model or TCP/IP model. Another unique feature is that it is not mandatory for all the devices in the Bluetooth system to use all the protocols in the stack. This is because Bluetooth is designed to be used by myriad applications and the application designates which part of the protocol stack is to be used. Protocols in the Bluetooth Protocol Stack ... Read More

Bluetooth Usage and Applications

Moumita
Updated on 22-May-2020 11:56:10

15K+ Views

Bluetooth is a network technology that connects mobile devices wirelessly over a short-range to form a personal area network (PAN). They use short-wavelength, ultra-high frequency (UHF) radio waves within the range 2.400 to 2.485 GHz, for wireless communications.Bluetooth UsageUsage of Bluetooth can be broadly categorized into three areas −Access Points for Data and Voice − Real-time voice and data transmissions are provided by Bluetooth by connecting portable and stationary network devices wirelessly.Cable replacement − Bluetooth replaces the need for a large number of wires and cables of wired networks. The connections can be made instantly and are retained even when ... Read More

Logical Link Control Adaptation Protocol (L2CAP)

Moumita
Updated on 22-May-2020 11:53:03

7K+ Views

Logical Link Control and Adaptation Protocol (L2CAP) is a protocol used in the Bluetooth standard that provides adaption between higher layers and the baseband layer of the Bluetooth stack. It operates just above the host-controller interface (HCI) passing data frames from the higher layers to either HCI or Link Manager.The following diagram shows the position of L2CAP in Bluetooth protocol architecture −Functions of L2CAPAdaptation between higher-layer frames and lower layer frames of the Bluetooth protocol stack.Support for both connection-oriented as well as connectionless services.Supporting two links for the Baseband layer −Synchronous Connection-Oriented (SCO) links for real-time voice traffic using reserved ... Read More

The Bluetooth Radio Layer

Moumita
Updated on 22-May-2020 11:51:06

3K+ Views

The Bluetooth radio layer is the lowest layer of Bluetooth architecture that corresponds to the physical layer of the OSI model. It lays down the physical structure and specifications for the transmission of radio waves.The position of the radio layer depicted in the following diagram −Characteristic Features of Bluetooth Radio LayerThe Bluetooth radio layer lays down the requirements of the Bluetooth transceiver device that communicates using Bluetooth technology.It defines air interface, frequency bands, frequency hopping specifications, and modulation techniques.This layer is responsible for moving data bits from the master device to the slave device, and vice versa.It is a low-power ... Read More

The Bluetooth Protocol Architecture

Moumita
Updated on 03-Nov-2023 03:33:56

49K+ Views

Bluetooth network technology connects mobile devices wirelessly over a short-range to form a personal area network (PAN). The Bluetooth architecture has its own independent model with a stack of protocols, instead of following the standard OSI model or TCP/IP model. The protocols in the Bluetooth standard can be loosely grouped into the physical layer, data link layer, middleware layer, and application layer as shown in the following diagram − Protocols in the Bluetooth Protocol Architecture Physical Layer − This includes Bluetooth radio and Baseband (also in the data link layer. ... Read More

The 802.16 MAC Sublayer Protocol

Moumita
Updated on 27-Apr-2020 07:17:49

3K+ Views

The IEEE 802.16 is a set of standards defining the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access. It lays down the standards for both physical layer as well as medium access control (MAC) layer for WiMAX.The IEEE 802.16 MAC sublayer is a part of the data link layer. The data link layer of WiMAX is divided into three sublayers as follows −Security sublayer − This is the bottommost layer and is concerned with the security and privacy of the wireless ... Read More

Advertisements