Found 1217 Articles for MCA

What is CIDR and how it works?

Bhanu Priya
Updated on 16-Sep-2021 06:53:34

13K+ Views

Classless Inter-Domain Routing (CIDR) is a group of IP addresses that are allocated to the customer when they demand a fixed number of IP addresses.In CIDR there is no wastage of IP addresses as compared to classful addressing because only the numbers of IP addresses that are demanded by the customer are allocated to the customer.The group of IP addresses is called Block in Classless Inter - Domain (CIDR).CIDR follows CIDR notation or Slash notation. The representation of CIDR notation is x.y.z.w /n the x.y.z.w is IP address and n is called mask or number of bits that are used ... Read More

What is DSL technology and differentiate between DSL modem and DSLAM?

Bhanu Priya
Updated on 16-Sep-2021 06:51:53

2K+ Views

The DSL technology is defined as the digital subscriber lines. Here, the data is transmitted to the users over the telephone signal lines.Voice communication over the telephone is the best example of the digital subscriber lines. Also, there are DSL services that are provided by DSL technology.Here there is asymmetric and symmetric digital subscriber line both are supported by the DSL network.The services provided by the companies that provide the DSL are −The broadband internet connectionVoice communicationVideo streaming at low speed is offered by the companies using the DSL network.Purpose of DSLThe purposes of DSL are explained below −DSL is ... Read More

What are the different types of ISDN?

Bhanu Priya
Updated on 16-Sep-2021 06:49:49

3K+ Views

ISDN stands for integrated service digital network. It is a telephone switched network which integrates voice and data over a digital line simultaneously. It also provides packet switched networks.ISDN supports a variety of services which are as follows −Voice callsVideo textsElectronic mailDatabase accessFacsimileTeletextData transmission and voiceConnection to internetElectronic Fund transferImage and graphics exchangeDocument storage and transferAudio and Video ConferencingThe figure given below depicts ISDN −Channels of ISDNISDN has mainly three channels, which are as follows −B-channel − It offers a speed of around 64kbps, which can be used for home purpose.D-channel − It offers speeds ranging from 16 to 64 ... Read More

Differentiate between piconet and scatternet

Bhanu Priya
Updated on 16-Sep-2021 06:46:28

16K+ Views

Let us understand the concept of piconet and scatternet before learning the differences between them.PiconetA piconet is a network created by connecting multiple wireless devices using Bluetooth technology. In a piconet network a master device exists, this master device cm gets connected to 7 more slave devices.It includes the master the number of devices that can be connected is limited to 8. Due to less number of devices active at a time the usage of channel band width is not more.Number of devices that can be connected is limited to 8. It is applicable for devices belonging to small areas.Given ... Read More

What is the protocol that is associated with multicasting?

Bhanu Priya
Updated on 16-Sep-2021 06:43:27

281 Views

A group of communication in a computer network is multicasting, where a sender sends data to multiple receivers simultaneously. Simply in Multicasting we send data across a computer network to several users at the same time. It supports one-to-many and many-to-many data transmission across LANs or WANs.User Datagram Protocol (UDP)The most common protocol (transport layer protocol) to use multicast addressing is User Datagram Protocol (UDP).User datagram protocol is defined as the simplest transport layer communication protocol available of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. It is one of the core members of the Internet protocol suite. It Increases ... Read More

How OSPF routes the packets from source to destination?

Bhanu Priya
Updated on 16-Sep-2021 06:41:53

804 Views

Open Shortest Path First (OSPF) is a router protocol used to find the best path for packets as they pass through a set of connected networks.This protocol is designated by the Internet Engineering Task Force (IETF) one of the Interior Gateway Protocols (IGPs) aimed at traffic moving around within a larger autonomous system network like a single enterprise's network, which may in turn be made up of many separate local area networks linked through routers.ExplanationArea 1 Border router Area 0 Backbone zone Border router Area 2 OSPF.OSPF protocol is called a link state routing protocol, which maintains link state databases. ... Read More

What are the types of ICMP message types?

Bhanu Priya
Updated on 16-Sep-2021 06:38:41

5K+ Views

Internet Control Message Protocol (ICMP) shares error reporting and device status messages which can be further divided into specific message types with their codes.These message types can be divided into two categories −Error Reporting MessagesQuery MessagesThese message types are shown below −Error Reporting MessagesThese are messages which are sent when an error is reported by ICMP protocol.Some of common messages under this category are as follows:Destination Unreachable (Type 3)One of the most common error reporting messages occurs when the router is unable to locate the path of the packet where it is needed to be delivered and in this case ... Read More

What are security issues in IP protocol?

Bhanu Priya
Updated on 16-Sep-2021 06:37:04

3K+ Views

There are three security issues that are applicable to the IP protocol −Packet SniffingPacket ModificationIP SpoofingLet us discuss each issue in detail.Packet SniffingA guest may intercept an IP packet and create a copy of it.The packet sniffing is generally a passive attack, where the attacker does not change the contents of the packet.Packet sniffing attack is difficult to detect because here the sender and receiver doesn’t know that the packet has been copied.Even though the packet sniffing cannot be stopped, the encryption of the packet can make the attacker’s effort useless. Still the attackers may sniff the packet, but the ... Read More

What is IPV4 address notation and hierarchy of addressing?

Bhanu Priya
Updated on 16-Sep-2021 06:36:03

4K+ Views

The Internet Protocol version 4 (IPv4) is called the fourth version in the development of the Internet Protocol. Its address is a 32-bit address which uniquely defines the connection that means here each address defines one, and only one, connection to the Internet.If a device has two connections to the Internet, via two networks, then we call it has two IPv4 addresses.IPv4 addresses are universal in a sense where the addressing system must be accepted by any host that wants to be connected to the Internet.Ipv4 address notationThere are three notations to show an IPv4 address which are as follows ... Read More

What are issues in congestion and Flow control in LANs?

Bhanu Priya
Updated on 16-Sep-2021 06:33:18

581 Views

Let us understand the concept of flow control and congestion control.Flow controlIt is handled by a receiving side and it safeguards that a sender can only send something that a receiver can control or handle.Flow control handles a mechanism available to safeguard that communication flows smoothly.For example, a situation where somebody has a quick fiber connection could be sending on something or dial up similar. A sender could have the capability to send packets quickly, however that can be useless to a receiver on dialup. Thus they require a method to throttle the sending side.The issues related to flow control ... Read More

Advertisements