Found 1627 Articles for Computer Network

Pure ALOHA

Moumita
Updated on 23-Sep-2020 08:54:13

18K+ Views

ALOHA is a medium access control (MAC) protocol for transmission of data via a shared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel. There are two types of ALOHA protocols – Pure ALOHA and Slotted ALOHA.In pure ALOHA, the time of transmission is continuous. Whenever a station has an available frame, it sends the frame. If there is collision and the frame is destroyed, the sender waits for a random amount of time before retransmitting it.Working PrincipleAfter transmitting a frame, a station waits for a finite period of time ... Read More

ALOHA Protocol in computer network

Moumita
Updated on 02-Sep-2023 10:08:55

76K+ Views

ALOHA is a multiple access protocol for transmission of data via a shared network channel. It operates in the medium access control sublayer (MAC sublayer) of the open systems interconnection (OSI) model. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel.In ALOHA, each node or station transmits a frame without trying to detect whether the transmission channel is idle or busy. If the channel is idle, then the frames will be successfully transmitted. If two frames attempt to occupy the channel simultaneously, collision of frames will occur and the frames will be ... Read More

Multiple Access Protocols in Computer Networks

Moumita
Updated on 22-Oct-2023 01:57:39

23K+ Views

Multiple access protocols are a set of protocols operating in the Medium Access Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI) model. These protocols allow a number of nodes or users to access a shared network channel. Several data streams originating from several nodes are transferred through the multi-point transmission channel. The objectives of multiple access protocols are optimization of transmission time, minimization of collisions and avoidance of crosstalks. Categories of Multiple Access Protocols Multiple access protocols can be broadly classified into three categories - random access protocols, controlled access protocols and channelization protocols. ... Read More

The IEEE 802.1Q Standard

Moumita
Updated on 22-Jul-2020 08:44:39

2K+ Views

The IEEE 802.1Q networking standard lays down the specifications for VLANs (Virtual Local Area Networks or Virtual LANs) on an IEEE 802.3 Ethernet network. The standard is generally referred as Dot1Q. VLANs are a logical group of computers that appear to be on the same LAN irrespective of the configuration of the underlying physical network. Network administrators partition the networks to match the functional requirements of the VLANs so that each VLAN comprise of a subset of ports on a single or multiple switches or bridges. This allows computers and devices in a VLAN to communicate in the simulated environment ... Read More

What are Gateways in Computer Network?

Moumita
Updated on 06-Sep-2023 11:19:36

41K+ Views

A gateway is a network node that forms a passage between two networks operating with different transmission protocols. The most common type of gateways, the network gateway operates at layer 3, i.e. network layer of the OSI (open systems interconnection) model. However, depending upon the functionality, a gateway can operate at any of the seven layers of OSI model. It acts as the entry – exit point for a network since all traffic that flows across the networks should pass through the gateway. Only the internal traffic between the nodes of a LAN does not pass through the gateway.Features of ... Read More

What are Routers in Computer Network?

Moumita
Updated on 02-Sep-2023 13:46:41

44K+ Views

Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are responsible for receiving, analysing, and forwarding data packets among the connected computer networks. When a data packet arrives, the router inspects the destination address, consults its routing tables to decide the optimal route and then transfers the packet along this route.Features of RoutersA router is a layer 3 or network layer device.It connects different networks together and sends data packets from one network to another.A router can be used both in LANs (Local Area Networks) and WANs (Wide Area Networks).It transfers data ... Read More

What are Switches in Computer Network?

Moumita
Updated on 02-Sep-2023 10:35:46

62K+ Views

Switches are networking devices operating at layer 2 or a data link layer of the OSI model. They connect devices in a network and use packet switching to send, receive or forward data packets or data frames over the network.A switch has many ports, to which computers are plugged in. When a data frame arrives at any port of a network switch, it examines the destination address, performs necessary checks and sends the frame to the corresponding device(s). It supports unicast, multicast as well as broadcast communications.Features of SwitchesA switch operates in the layer 2, i.e. data link layer of ... Read More

What are Hubs in Computer Network?

Moumita
Updated on 22-Jul-2020 08:36:59

16K+ Views

Hubs are networking devices operating at a physical layer of the OSI model that are used to connect multiple devices in a network. They are generally used to connect computers in a LAN.A hub has many ports in it. A computer which intends to be connected to the network is plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to every other port, without considering whether it is destined for a particular destination device or not.Features of HubsA hub operates in the physical layer of the OSI model.A hub cannot filter ... Read More

Spanning Tree Protocol

Moumita
Updated on 13-Jul-2020 05:50:38

5K+ Views

Spanning Tree Protocol (STP) is a communication protocol operating at data link layer the OSI model to prevent bridge loops and the resulting broadcast storms. It creates a loop − free topology for Ethernet networks.Working PrincipleA bridge loop is created when there are more than one paths between two nodes in a given network. When a message is sent, particularly when a broadcast is done, the bridges repeatedly rebroadcast the same message flooding the network. Since a data link layer frame does not have a time-to-live field in the header, the broadcast frame may loop forever, thus swamping the channels.Spanning ... Read More

What is Wormhole switching?

Moumita
Updated on 13-Jul-2020 05:48:37

675 Views

In data communications, wormhole switching a flow control technique where large data frames or packets are partitioned and then transmitted. When a switching device (a bridge or a switch) receives a data packet, it partitions the packet into small parts called flow control units or flits. The flits are transmitted one by one instead of the whole packet. Also called wormhole flow control, wormhole switching is subtype of flit-buffer flow control methods and is based upon fixed links.Working PrincipleIn this technique, each packet or frame is broken into smaller pieces of data called flits. The header flits contain the destination ... Read More

Advertisements