- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1310 Articles for Computer Network

Updated on 30-Jul-2019 22:30:26
Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type ... Read More 
Updated on 30-Jul-2019 22:30:26
IEEE 802.3 is a set of standards and protocols that define Ethernet-based networks. Ethernet technologies are primarily used in LANs, though they can also be used in MANs and even WANs. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.IEEE 802.3 Popular VersionsThere are a number of versions of IEEE 802.3 protocol. The most popular ones are.IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial cable into which a connection can be tapped by drilling into the cable to the ... Read More 
Updated on 30-Jul-2019 22:30:26
Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s as IEEE 802.3 standard. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type of medium used. Most varieties of classic Ethernet have become obsolete in present communication scenario.Varieties of Classic EthernetThe common varieties of classic ... Read More 
Updated on 30-Jul-2019 22:30:26
Clear to Send (CTS) is a control frame employed in the medium access control (MAC) layer protocol IEEE 802.11 RTS/CTS. The protocol uses the concept of Multiple Access with Collision Avoidance (MACA) in wireless networks. The RTS/CTS (Request to Send / Clear to Send) mechanism aims to reduce frame collisions introduced by the hidden terminal problem. CTS frame is sent by the receiver after it gets the RTS frame prior to receiving of the actual data frame.Working Principle of MACA implementing CTSThe MACA protocol works with the condition that the communicating stations are synchronized and frame sizes and data speed ... Read More 
Updated on 30-Jul-2019 22:30:26
Request to Send (RTS) is a control frame employed in the medium access control (MAC) layer protocol IEEE 802.11 RTS/CTS. The protocol uses the concept of Multiple Access with Collision Avoidance (MACA) in wireless networks. The RTS/CTS (Request to Send / Clear to Send) mechanism aims to reduce frame collisions introduced by the hidden terminal problem. RTS frame is sent by the transmitter prior to transmission of the actual data frame.Working Principle of MACA implementing RTSThe MACA protocol works with the condition that the communicating stations are synchronized and frame sizes and data speed are the same.Let us consider that ... Read More 
Updated on 30-Jul-2019 22:30:26
Multiple Access with Collision Avoidance (MACA) is a medium access control (MAC) layer protocol used in wireless networks, with a view to solve the hidden terminal problem. It also provides solution to the exposed terminal problem. The MAC layer protocol IEEE 802.11 RTS/CTS has been adopted from MACA.Working PrincipleThe MACA protocol works with the condition that the stations are synchronized and frame sizes and data speed are the same. It involves transmission of two frames called RTS and CTS prior to data transmission. RTS stands for Request to Send and CTS stands for Clear to Send.Let us consider that a ... Read More 
Updated on 30-Jul-2019 22:30:26
In wireless LANs ( wireless local area networks), the hidden terminal problem is a transmission problem that arises when two or more stations who are out of range of each other transmit simultaneously to a common recipient. This is prevalent in decentralised systems where there aren’t any entity for controlling transmissions. This occurs when a station is visible from a wireless access point (AP), but is hidden from other stations that communicate with the AP.Problem IllustrationSuppose that there are three stations labelled STA, STB, and STC, where STA and STC are transmitting while STB is receiving. The stations are in ... Read More 
Updated on 30-Jul-2019 22:30:26
In wireless LANs (wireless local area networks), the exposed terminal problem is a transmission problem that arises when a transmitting station is prevented from sending frames due to interference with another transmitting station. This is prevalent in decentralised systems where there aren’t any entity for controlling transmissions. This occurs when a station is visible from a wireless access point (AP), but not from other stations that communicate with the AP.Problem IllustrationSuppose that there are four stations labelled STA, STB, STC, and STD, where STB and STC are transmitters while STA and STD are receivers at some slot of time. The ... Read More 
Updated on 30-Jul-2019 22:30:26
Wireless LANs refer to LANs (Local Area Networks) that use high frequency radio waves instead of cables for connecting the devices. It can be conceived as a set of laptops and other wireless devices communicating by radio signals. Users connected by WLANs can move around within the area of network coverage. Most WLANs are based upon the standard IEEE 802.11 or WiFi.Configuration of Wireless LANsEach station in a Wireless LAN has a wireless network interface controller. A station can be of two categories −Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless routers that form ... Read More 
Updated on 30-Jul-2019 22:30:26
Adaptive Tree Walk Protocol is a technique for transmitting data over shared channels that combines the advantages of collision based protocols and collision free protocols.In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled, an event called collision. In collision based protocols like ALOHA, all stations are permitted to transmit a frame without trying to detect whether the transmission channel is idle or busy. This works very good under light loads. Under heavy loads, collision free protocols are suitable, since channel access is resolved in the contention period that ... Read More Advertisements