MCA Articles

Found 937 articles

Multi-access Channels and Random Access Channels

Vikyath Ram
Vikyath Ram
Updated on 05-Nov-2024 1K+ Views

Multi-access ChannelsMulti-access channels are network channels that allow several transmitters to communicate with a common receiver via a shared channel. These channels are also called multiple access (MAC) channels. The network channel may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.Random Access ChannelsRandom-access channels (RACH) are shared channels used in wireless communication systems to allow mobile devices for call set-up. RACH also handles bursty data transmission. RACH is popularly used by GSM mobiles for transmission over cellular networks.Multiple Access SchemesBoth multi-access channels and random access channels require a scheme to allow ...

Read More

Introduction to Host Names: Understanding the Basics

sudhir sharma
sudhir sharma
Updated on 26-Feb-2024 717 Views

In the world of computers and the internet, host names are a critical component of how devices connect to each other. A host name is a unique identifier that is assigned to a device or a server on a network. It is used to identify and locate devices on the internet or any other network. What is a Host Name? A host name is a label that is assigned to a device on a network. It is used to identify and locate devices on the internet or any other network. A host name is made up of a combination of ...

Read More

Race Condition, Critical Section and Semaphore

Ricky Barnes
Ricky Barnes
Updated on 07-Nov-2023 42K+ Views

Race conditions, Critical Sections and Semaphores are an key part of Operating systems. Details about these are given as follows −Race ConditionA race condition is a situation that may occur inside a critical section. This happens when the result of multiple thread execution in critical section differs according to the order in which the threads execute.Race conditions in critical sections can be avoided if the critical section is treated as an atomic instruction. Also, proper thread synchronization using locks or atomic variables can prevent race conditions.Critical SectionThe critical section in a code segment where the shared variables can be accessed. ...

Read More

Network Software

Vikyath Ram
Vikyath Ram
Updated on 07-Nov-2023 33K+ Views

Network software encompasses a broad range of software used for design, implementation, and operation and monitoring of computer networks. Traditional networks were hardware based with software embedded. With the advent of Software – Defined Networking (SDN), software is separated from the hardware thus making it more adaptable to the ever-changing nature of the computer network.Functions of Network SoftwareHelps to set up and install computer networksEnables users to have access to network resources in a seamless mannerAllows administrations to add or remove users from the networkHelps to define locations of data storage and allows users to access that dataHelps administrators and ...

Read More

Client Server Computing

David Meador
David Meador
Updated on 07-Nov-2023 48K+ Views

In client server computing, the clients requests a resource and the server provides that resource. A server may serve multiple clients at the same time while a client is in contact with only one server. Both the client and server usually communicate via a computer network but sometimes they may reside in the same system.An illustration of the client server system is given as follows −Characteristics of Client Server ComputingThe salient points for client server computing are as follows:The client server computing works with a system of request and response. The client sends a request to the server and the ...

Read More

Readers-Writers Problem

Ricky Barnes
Ricky Barnes
Updated on 07-Nov-2023 63K+ Views

The readers-writers problem relates to an object such as a file that is shared between multiple processes. Some of these processes are readers i.e. they only want to read the data from the object and some of the processes are writers i.e. they want to write into the object.The readers-writers problem is used to manage synchronization so that there are no problems with the object data. For example - If two readers access the object at the same time there is no problem. However if two writers or a reader and writer access the object at the same time, there ...

Read More

User-level threads and Kernel-level threads

Alex Onsman
Alex Onsman
Updated on 04-Nov-2023 32K+ Views

A thread is a lightweight process that can be managed independently by a scheduler. It improves the application performance using parallelism.A thread shares information like data segment, code segment files etc. with its peer threads while it contains its own registers, stack, counter etc.The two main types of threads are user-level threads and kernel-level threads. A diagram that demonstrates these is as follows −User - Level ThreadsThe user-level threads are implemented by users and the kernel is not aware of the existence of these threads. It handles them as if they were single-threaded processes. User-level threads are small and much ...

Read More

What is IEEE 802.3?

Ankith Reddy
Ankith Reddy
Updated on 03-Nov-2023 43K+ Views

IEEE 802.3 is a set of standards and protocols that define Ethernet-based networks. Ethernet technologies are primarily used in LANs, though they can also be used in MANs and even WANs. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.IEEE 802.3 Popular VersionsThere are a number of versions of IEEE 802.3 protocol. The most popular ones are.IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial cable into which a connection can be tapped by drilling into the cable to the ...

Read More

IEEE 802.3 and Ethernet

George John
George John
Updated on 03-Nov-2023 48K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type ...

Read More

Degree of Vertex of a Graph

Mahesh Parahar
Mahesh Parahar
Updated on 03-Nov-2023 46K+ Views

It is the number of vertices adjacent to a vertex V. Notation − deg(V). In a simple graph with n number of vertices, the degree of any vertices is − deg(v) = n – 1 ∀ v ∈ G A vertex can form an edge with all other vertices except by itself. So the degree of a vertex will be up to the number of vertices in the graph minus 1. This 1 is for the self-vertex as it cannot form a loop by itself. If there is a loop at any of the vertices, then it is not a ...

Read More
Showing 1–10 of 937 articles
« Prev 1 2 3 4 5 94 Next »
Advertisements