Found 1320 Articles for MCA

Calculation of TCP Checksum

Satish Kumar
Updated on 08-Feb-2023 20:51:26

12K+ Views

The Transmission Control Protocol (TCP) checksum is a method used to detect errors in TCP packets. The checksum is calculated by taking the binary value of all the fields in the TCP header and the data, treating them as a large integer, and then performing a bit-wise ones complement on that integer. To calculate the TCP checksum, the following steps are performed − The checksum field in the TCP header is set to zero. The binary values of the source and destination IP addresses, the reserved field, the protocol field (set to 6 for TCP), the TCP length, and ... Read More

Cable TV Networks

Satish Kumar
Updated on 08-Feb-2023 21:34:08

2K+ Views

Cable television networks are television channels that are delivered to viewers through cable television systems, as opposed to broadcast television, satellite television, or the internet. Some examples of popular cable TV networks in the United States include ESPN, TNT, and HBO. Cable networks can also be divided into categories, such as news networks (CNN, Fox News), sports networks (ESPN, NBC Sports), movie networks (HBO, Showtime), and lifestyle networks (Food Network, HGTV). Cable Network operate by subscription where viewer pays to the operator to get access to the channels. Types of Cable TV Networks There are several different types of cable ... Read More

Cable TV for Data Transfer

Satish Kumar
Updated on 08-Feb-2023 21:35:52

1K+ Views

Cable television (TV) networks have been used for data transfer in the past. Cable TV networks were initially designed to transmit television signals, but they have also been used to provide internet access and other types of data transfer services. This is typically done using a technology called "cable modem, " which allows data to be sent over the same cable that is used to transmit TV signals. Cable TV companies often provide internet service through cable modems as part of a bundle that includes TV and telephone services. Cable modem internet service is generally faster than DSL and has ... Read More

Bus topology vs Ring topology

Satish Kumar
Updated on 08-Feb-2023 20:57:04

3K+ Views

Bus Topology In computer networking, a bus topology is a network architecture in which devices are connected to a common cable called the bus or backbone. The bus is a single cable that runs the length of the network and to which all devices connect. Data transmitted on the bus is sent to all devices connected to it, but only the intended recipient actually receives and processes the data. One of the main advantage of bus topology is that it is simple and inexpensive to implement, as only a single cable is needed to connect all devices. The main disadvantage ... Read More

Buffering in Computer Network

Satish Kumar
Updated on 08-Feb-2023 20:59:21

4K+ Views

Buffering refers to the process of temporarily storing data in memory (a buffer) before it is sent or received over a network. The buffer helps to smooth out any variations in the rate at which data can be sent or received, and ensures that the sender and receiver can work at their own pace without interruption. For example, when streaming a video, the video player may buffer some of the video before it starts playing. This is done so that if the network connection is slow, the video can continue playing without interruption. Similarly, when a computer is sending data ... Read More

Bootstrap Protocol (BOOTP)

Satish Kumar
Updated on 08-Feb-2023 21:03:00

2K+ Views

The Bootstrap Protocol (BOOTP) is a legacy computer networking protocol used to automatically assign IP addresses to devices on a network. BOOTP was developed in the 1980s as a way to assign IP addresses to diskless workstations without the need for a DHCP server. BOOTP works by allowing a device to broadcast a request for an IP address on the network. The BOOTP server, which is typically a router or a dedicated BOOTP server, receives the request and assigns an IP address to the device. The device then uses the assigned IP address to communicate with other devices on the ... Read More

Birman Schiper Stephenson Protocol

Satish Kumar
Updated on 08-Feb-2023 21:27:29

474 Views

The Birman-Schiper-Stephenson (BSS) Protocol is a distributed computing protocol that allows a group of computers to maintain a consistent shared state despite the possibility of failures. It was first described in a paper by Michael Birman, Roger Schiper, and Tom Stephenson in 1985. In the BSS Protocol, each computer in the group is assigned a unique identifier and acts as a "replica" of the shared state. The replicas communicate with each other using a series of message passing operations to maintain consistency of the shared state. The protocol is based on a "token" that is passed between replicas, which serves ... Read More

Binary Synchronous Communication (BISYNC)

Satish Kumar
Updated on 08-Feb-2023 21:28:48

1K+ Views

Binary Synchronous Communication (BISYNC) is a communication protocol that uses synchronous transmission to transfer data between devices. In BISYNC, data is transmitted in fixed-length blocks, called frames, with a start and stop bit at the beginning and end of each frame. The start and stop bits are used to synchronize the sender and receiver, so that they can accurately read and interpret the data in the frame. BISYNC uses a complex set of control characters to manage the flow of data and to maintain the synchronization between the sender and receiver. For example, the "ENQ" (enquiry) character is used to ... Read More

Berkeley's Algorithm

Satish Kumar
Updated on 08-Feb-2023 21:31:46

4K+ Views

Berkeley's Algorithm is a distributed algorithm for computing the correct time in a network of computers. The algorithm is designed to work in a network where clocks may be running at slightly different rates, and some computers may experience intermittent communication failures. The basic idea behind Berkeley's Algorithm is that each computer in the network periodically sends its local time to a designated "master" computer, which then computes the correct time for the network based on the received timestamps. The master computer then sends the correct time back to all the computers in the network, and each computer sets its ... Read More

Basics of NS2 and Otcltcl script

Satish Kumar
Updated on 06-Feb-2023 21:05:26

2K+ Views

NS2 (Network Simulator version 2) is a discrete event network simulator that is widely used to simulate and analyze the behavior of computer networks. It is open-source software and is written in C++ and Otcl (Object-oriented Tool Command Language). The Otcl (Object-oriented Tool Command Language) is an extension of Tcl (Tool Command Language) and is used to create and control network entities and configure network scenarios in NS2. NS2 has two parts: the C++ part, which provides the underlying simulation engine, and the Otcl part, which provides the user interface and interaction between the user and the C++ part. The ... Read More

Advertisements