Computer Network Articles

Page 3 of 122

Hard and Soft Decision Decoding

Nancy Den
Nancy Den
Updated on 16-Mar-2026 11K+ Views

A challenging task in error correction is decoding the codewords that have been received via noisy channels. Before data is transmitted, the sender adds redundant bits or parity bits to the message forming codewords. The codewords are then transmitted via computer networks. The receiver checks the incoming codewords and performs the decoding or error correction process to retrieve the original data. If there are no errors, i.e. the codewords find an exact matching, then it is easy to decode the data by eliminating the parity bits. However, if a match is not found, then more complex decoding mechanisms are ...

Read More

What Are The Major Limitations Of Blockchain Technology?

Riddhi Sultania
Riddhi Sultania
Updated on 16-Mar-2026 4K+ Views

Blockchain technology has gained significant attention for its potential to revolutionize various industries. However, like any emerging technology, blockchain faces several major limitations that must be understood before widespread adoption. These challenges affect its practical implementation and scalability in real-world scenarios. While blockchain offers benefits like immutability, decentralization, and transparency, understanding its limitations is crucial for making informed decisions about its implementation in different use cases. What is Blockchain? Blockchain is a decentralized ledger technology where each node in the network maintains its own copy of the ledger. All transactions are verified through a consensus mechanism without ...

Read More

Link Control Protocol (LCP)

karthikeya Boyini
karthikeya Boyini
Updated on 16-Mar-2026 6K+ Views

Link Control Protocol (LCP) is a crucial component of the Point-to-Point Protocol (PPP) that operates at the data link layer. It is responsible for establishing, configuring, testing, maintaining, and terminating point-to-point links for data transmission. LCP also handles negotiation of setup options and features between the two endpoints of a communication link. How It Works When PPP initiates communication, it sends LCP packets before establishing connections over the point-to-point link. These LCP packets test the communication line to determine if it can handle the required data volume at the specified speed. Based on this assessment, LCP negotiates the ...

Read More

Collision-Free Protocols

Arushi
Arushi
Updated on 16-Mar-2026 20K+ Views

In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled. This event is called collision. The Medium Access Control (MAC) layer of the OSI model is responsible for handling collision of frames. Collision-free protocols are devised so that collisions do not occur. Protocols like CSMA/CD and CSMA/CA nullify the possibility of collisions once the transmission channel is acquired by any station. However, collision can still occur during the contention period if more than one station starts to transmit at the same time. Collision-free protocols resolve collision in the ...

Read More

Bit-Map Protocol

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 5K+ Views

Bit-map protocol is a collision-free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. This is an example of a Reservation Protocol, where stations reserve the channel before data transmission begins. Working Principle In this protocol, the contention period is divided into N slots, where N is the total number of stations sharing the channel. If a station ...

Read More

The Adaptive Tree Walk Protocol

Nishtha Thakur
Nishtha Thakur
Updated on 16-Mar-2026 9K+ Views

The Adaptive Tree Walk Protocol is a channel access technique for shared communication channels that dynamically combines the advantages of collision-based protocols (like ALOHA) and collision-free protocols. It adapts to network load conditions by organizing stations in a hierarchical tree structure. In computer networks, when multiple stations transmit simultaneously over a shared channel, their data collides and becomes garbled. Collision-based protocols like ALOHA allow all stations to transmit freely without checking channel availability, which works well under light loads. Collision-free protocols resolve channel access through contention periods, eliminating collisions but adding overhead that benefits heavy loads. The Adaptive ...

Read More

Architecture of Classic Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in the 1980s as the IEEE 802.3 standard. Ethernet is classified into two categories: classic Ethernet and switched Ethernet. Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred to as 10BASE-X. Here, 10 is the maximum throughput (10 Mbps), BASE denotes use of baseband transmission, and X is the type of medium used. Architecture Classic Ethernet is the simplest form of Ethernet. It comprises an Ethernet ...

Read More

Switched Ethernet vs. Classic Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s as IEEE 802.3 standard. Ethernet can be broadly classified into two types − Types of Ethernet Classic Ethernet Hub-based Shared medium 3-10 Mbps Switched Ethernet Switch-based Dedicated connections Higher speeds What are Classic Ethernet and Switched Ethernet? Classic Ethernet is the original ...

Read More

What is Classic Ethernet MAC Sublayer Protocol?

Moumita
Moumita
Updated on 16-Mar-2026 7K+ Views

Classic Ethernet is the original form of Ethernet used primarily in LANs, providing data rates between 3 to 10 Mbps. It operates both in the physical layer and in the MAC (Media Access Control) sublayer of the OSI model. In the physical layer, the features of cables and networks are considered, while in the MAC sublayer, the frame formats for Ethernet data transmission are defined. Classic Ethernet was first standardized in the 1980s as the IEEE 802.3 standard, establishing the foundation for modern Ethernet technologies. Frame Format of Classic Ethernet Classic Ethernet frames can be either Ethernet ...

Read More

The Modulation and Multiplexing

Sai Subramanyam
Sai Subramanyam
Updated on 16-Mar-2026 10K+ Views

Modulation is the process of transforming a carrier signal so that it can carry the information of a message signal. It superimposes the contents of the message signal over a high-frequency carrier signal, which is then transmitted over communication channels. The primary purpose of modulation is to enable long-distance transmission of information by converting low-frequency message signals into high-frequency carrier signals that can propagate effectively through various communication media. Modulation Process Message Signal Modulator Modulated ...

Read More
Showing 21–30 of 1,220 articles
« Prev 1 2 3 4 5 122 Next »
Advertisements