Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Found 937 articles
Multi-access Channels and Random Access Channels
Multi-access ChannelsMulti-access channels are network channels that allow several transmitters to communicate with a common receiver via a shared channel. These channels are also called multiple access (MAC) channels. The network channel may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.Random Access ChannelsRandom-access channels (RACH) are shared channels used in wireless communication systems to allow mobile devices for call set-up. RACH also handles bursty data transmission. RACH is popularly used by GSM mobiles for transmission over cellular networks.Multiple Access SchemesBoth multi-access channels and random access channels require a scheme to allow ...
Read MoreIntroduction to Host Names: Understanding the Basics
In the world of computers and the internet, host names are a critical component of how devices connect to each other. A host name is a unique identifier that is assigned to a device or a server on a network. It is used to identify and locate devices on the internet or any other network. What is a Host Name? A host name is a label that is assigned to a device on a network. It is used to identify and locate devices on the internet or any other network. A host name is made up of a combination of ...
Read MoreRace Condition, Critical Section and Semaphore
Race conditions, Critical Sections and Semaphores are an key part of Operating systems. Details about these are given as follows −Race ConditionA race condition is a situation that may occur inside a critical section. This happens when the result of multiple thread execution in critical section differs according to the order in which the threads execute.Race conditions in critical sections can be avoided if the critical section is treated as an atomic instruction. Also, proper thread synchronization using locks or atomic variables can prevent race conditions.Critical SectionThe critical section in a code segment where the shared variables can be accessed. ...
Read MoreNetwork Software
Network software encompasses a broad range of software used for design, implementation, and operation and monitoring of computer networks. Traditional networks were hardware based with software embedded. With the advent of Software – Defined Networking (SDN), software is separated from the hardware thus making it more adaptable to the ever-changing nature of the computer network.Functions of Network SoftwareHelps to set up and install computer networksEnables users to have access to network resources in a seamless mannerAllows administrations to add or remove users from the networkHelps to define locations of data storage and allows users to access that dataHelps administrators and ...
Read MoreClient Server Computing
In client server computing, the clients requests a resource and the server provides that resource. A server may serve multiple clients at the same time while a client is in contact with only one server. Both the client and server usually communicate via a computer network but sometimes they may reside in the same system.An illustration of the client server system is given as follows −Characteristics of Client Server ComputingThe salient points for client server computing are as follows:The client server computing works with a system of request and response. The client sends a request to the server and the ...
Read MoreReaders-Writers Problem
The readers-writers problem relates to an object such as a file that is shared between multiple processes. Some of these processes are readers i.e. they only want to read the data from the object and some of the processes are writers i.e. they want to write into the object.The readers-writers problem is used to manage synchronization so that there are no problems with the object data. For example - If two readers access the object at the same time there is no problem. However if two writers or a reader and writer access the object at the same time, there ...
Read MoreUser-level threads and Kernel-level threads
A thread is a lightweight process that can be managed independently by a scheduler. It improves the application performance using parallelism.A thread shares information like data segment, code segment files etc. with its peer threads while it contains its own registers, stack, counter etc.The two main types of threads are user-level threads and kernel-level threads. A diagram that demonstrates these is as follows −User - Level ThreadsThe user-level threads are implemented by users and the kernel is not aware of the existence of these threads. It handles them as if they were single-threaded processes. User-level threads are small and much ...
Read MoreWhat is IEEE 802.3?
IEEE 802.3 is a set of standards and protocols that define Ethernet-based networks. Ethernet technologies are primarily used in LANs, though they can also be used in MANs and even WANs. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.IEEE 802.3 Popular VersionsThere are a number of versions of IEEE 802.3 protocol. The most popular ones are.IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial cable into which a connection can be tapped by drilling into the cable to the ...
Read MoreIEEE 802.3 and Ethernet
Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type ...
Read MoreDegree of Vertex of a Graph
It is the number of vertices adjacent to a vertex V. Notation − deg(V). In a simple graph with n number of vertices, the degree of any vertices is − deg(v) = n – 1 ∀ v ∈ G A vertex can form an edge with all other vertices except by itself. So the degree of a vertex will be up to the number of vertices in the graph minus 1. This 1 is for the self-vertex as it cannot form a loop by itself. If there is a loop at any of the vertices, then it is not a ...
Read More