MCA Articles

Page 2 of 94

How to Create a Shared Directory for All Users in Linux?

Pradeep Elance
Pradeep Elance
Updated on 03-Nov-2023 39K+ Views

When multiple users need access to the same set of directories of files then we need to create shared folders to be used by the users. In Linux there is concept of users and groups which can be given certain level of permissions that will enable them to share the data. Below are the steps how to create the shared folders where users can and update the files individually.Step 1 − Create the folder to be sharedAssuming we are setting up the shared folder from scratch, lets create the folder. The -p will create the directory and would ignore any ...

Read More

A Protocol Using Go-Back-N

Samual Sam
Samual Sam
Updated on 03-Nov-2023 39K+ Views

Go-Back-N protocol, also called Go-Back-N Automatic Repeat reQuest, is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1.Working PrincipleGo – Back – N ARQ provides for sending multiple frames before receiving the acknowledgment for the first frame. The frames are sequentially numbered and a finite number of frames. The maximum number of frames that can be sent depends upon the size of the sending window. If the acknowledgment of ...

Read More

What is hierarchical routing?

Bhanu Priya
Bhanu Priya
Updated on 01-Nov-2023 56K+ Views

In hierarchical routing, the routers are divided into regions. Each router has complete details about how to route packets to destinations within its own region. But it does not have any idea about the internal structure of other regions.As we know, in both LS and DV algorithms, every router needs to save some information about other routers. When network size is growing, the number of routers in the network will increase. Therefore, the size of routing table increases, then routers cannot handle network traffic as efficiently. To overcome this problem we are using hierarchical routing.In hierarchical routing, routers are classified ...

Read More

Distributed Systems

David Meador
David Meador
Updated on 01-Nov-2023 42K+ Views

A distributed system contains multiple nodes that are physically separate but linked together using the network. All the nodes in this system communicate with each other and handle processes in tandem. Each of these nodes contains a small part of the distributed operating system software.A diagram to better explain the distributed system is −Types of Distributed SystemsThe nodes in the distributed systems can be arranged in the form of client/server systems or peer to peer systems. Details about these are as follows −Client/Server SystemsIn client server systems, the client requests a resource and the server provides that resource. A server ...

Read More

What are guided and unguided transmission media?

Bhanu Priya
Bhanu Priya
Updated on 01-Nov-2023 54K+ Views

In transmission media is the way the systems are connected to route data signals in a network.The telecommunication links are classified into two categories −Guided media (wired)Unguided media (wireless).Both guided and unguided are used for short distance (LANs, MANs) as well as long distance (WANs) communication.Let us discuss Guided transmission media.Guided transmission mediaGuided transmission media consists of physical connection between source and destination through a wire or a cable.There are three basic types of guided media which are as follows −Twisted pair cableCo-axial cableFiber-optic cableTwisted Pair CopperStep 1 − It is the most used media across the world. All the ...

Read More

What is Hamming Distance?

Nitya Raut
Nitya Raut
Updated on 01-Nov-2023 79K+ Views

Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ...

Read More

NMAP Cheat Sheet

Ajay yadav
Ajay yadav
Updated on 31-Oct-2023 99K+ Views

Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ...

Read More

Classful Vs Classless Addressing

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 31-Oct-2023 53K+ Views

Classful AddressThe first addressing system to be implemented as part of the Internet Protocol was Classful Addressing. In the year 1981, the Classful addressing network architecture was first used on the Internet. The Classful addressing system was superseded by a Classless addressing scheme with the introduction of Classless Inter-Domain Routing (CIDR) in 1993.The IP address comprises up of 32 bits and is split into four sections separated by dots: part 1, part 2, part 3, and part 4.The IP address is made up of four parts, each of which is eight bits long (1 byte).Further, the 4 parts of the ...

Read More

Medium Access Control Sublayer (MAC sublayer)

Samual Sam
Samual Sam
Updated on 31-Oct-2023 105K+ Views

The medium access control (MAC) is a sublayer of the data link layer of the open system interconnections (OSI) reference model for data transmission. It is responsible for flow control and multiplexing for transmission medium. It controls the transmission of data packets via remotely shared channels. It sends data over the network interface card. MAC Layer in the OSI Model The Open System Interconnections (OSI) model is a layered networking framework that conceptualizes how communications should be done between heterogeneous systems. The data link layer is the second lowest layer. It is divided into two sublayers − ...

Read More

How to Convert Decimal to Hexadecimal?

Arjun Thakur
Arjun Thakur
Updated on 31-Oct-2023 64K+ Views

Decimal system is most familiar number system to the general public. It is base 10 which has only 10 symbols − 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. Whereas Hexadecimal system is most familiar number system color representation in Computers or digital systems. It is base 16 which has only 16 symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and A, B, C, D, E, F. These A, B, C, D, E, F use as single digit in place of double digits, 10, 11, 12, 13, 14, 15 respectively.Conversion from Decimal to Hexadecimal ...

Read More
Showing 11–20 of 937 articles
« Prev 1 2 3 4 5 94 Next »
Advertisements