MCA Articles

Page 14 of 95

Constraint length of the Convolutional Code

Nitya Raut
Nitya Raut
Updated on 16-Mar-2026 4K+ Views

Convolutional codes are error correcting codes where data streams of indefinite lengths are encoded before transmission over noisy channels. The message streams are encoded by the sliding application of Boolean functions that generate a sequence of output bits. Convolutional codes were first introduced in 1955 by Elias. After extensive research by mathematicians, Viterbi developed an algorithm for maximum likelihood decoding in 1973, called the Viterbi algorithm, which led to modern convolutional codes. Parameters in Convolutional Codes For generating a convolutional code, information is passed sequentially through a linear finite-state shift register. The shift register comprises of K-bit ...

Read More

The Host-to-Network Layer in TCP/IP Model

Arushi
Arushi
Updated on 16-Mar-2026 6K+ Views

The host-to-network layer is the lowest layer of the TCP/IP model and is concerned with the physical transmission of data. It is also called a network interface layer or link layer. It can be considered as the combination of physical layer and data link layer of the OSI model. Functions of Host-to-Network Layer Bit encoding − It defines how bits are to be encoded into optical or electrical pulses. Frame encapsulation − It accepts IP packets from the network layer and encapsulates them into frames. It synchronizes the transmission of the frames as well ...

Read More

The Internet Layer in the TCP/IP Model

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 12K+ Views

The Internet layer is responsible for logical transmission of data packets over the internet. It can be compared to the network layer of the OSI model and serves as the backbone for routing data across interconnected networks. The main functions of the internet layer are: It transmits data packets to the link layer It routes each of the data packets independently from the source to the destination, using the optimal route It reassembles the out-of-order packets when they reach the destination It handles the error in transmission of data packets and fragmentation of data packets ...

Read More

Hard and Soft Decision Decoding

Nancy Den
Nancy Den
Updated on 16-Mar-2026 11K+ Views

A challenging task in error correction is decoding the codewords that have been received via noisy channels. Before data is transmitted, the sender adds redundant bits or parity bits to the message forming codewords. The codewords are then transmitted via computer networks. The receiver checks the incoming codewords and performs the decoding or error correction process to retrieve the original data. If there are no errors, i.e. the codewords find an exact matching, then it is easy to decode the data by eliminating the parity bits. However, if a match is not found, then more complex decoding mechanisms are ...

Read More

Link Control Protocol (LCP)

karthikeya Boyini
karthikeya Boyini
Updated on 16-Mar-2026 6K+ Views

Link Control Protocol (LCP) is a crucial component of the Point-to-Point Protocol (PPP) that operates at the data link layer. It is responsible for establishing, configuring, testing, maintaining, and terminating point-to-point links for data transmission. LCP also handles negotiation of setup options and features between the two endpoints of a communication link. How It Works When PPP initiates communication, it sends LCP packets before establishing connections over the point-to-point link. These LCP packets test the communication line to determine if it can handle the required data volume at the specified speed. Based on this assessment, LCP negotiates the ...

Read More

Collision-Free Protocols

Arushi
Arushi
Updated on 16-Mar-2026 21K+ Views

In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled. This event is called collision. The Medium Access Control (MAC) layer of the OSI model is responsible for handling collision of frames. Collision-free protocols are devised so that collisions do not occur. Protocols like CSMA/CD and CSMA/CA nullify the possibility of collisions once the transmission channel is acquired by any station. However, collision can still occur during the contention period if more than one station starts to transmit at the same time. Collision-free protocols resolve collision in the ...

Read More

Bit-Map Protocol

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 5K+ Views

Bit-map protocol is a collision-free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. This is an example of a Reservation Protocol, where stations reserve the channel before data transmission begins. Working Principle In this protocol, the contention period is divided into N slots, where N is the total number of stations sharing the channel. If a station ...

Read More

The Adaptive Tree Walk Protocol

Nishtha Thakur
Nishtha Thakur
Updated on 16-Mar-2026 9K+ Views

The Adaptive Tree Walk Protocol is a channel access technique for shared communication channels that dynamically combines the advantages of collision-based protocols (like ALOHA) and collision-free protocols. It adapts to network load conditions by organizing stations in a hierarchical tree structure. In computer networks, when multiple stations transmit simultaneously over a shared channel, their data collides and becomes garbled. Collision-based protocols like ALOHA allow all stations to transmit freely without checking channel availability, which works well under light loads. Collision-free protocols resolve channel access through contention periods, eliminating collisions but adding overhead that benefits heavy loads. The Adaptive ...

Read More

Architecture of Classic Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in the 1980s as the IEEE 802.3 standard. Ethernet is classified into two categories: classic Ethernet and switched Ethernet. Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred to as 10BASE-X. Here, 10 is the maximum throughput (10 Mbps), BASE denotes use of baseband transmission, and X is the type of medium used. Architecture Classic Ethernet is the simplest form of Ethernet. It comprises an Ethernet ...

Read More

Switched Ethernet vs. Classic Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s as IEEE 802.3 standard. Ethernet can be broadly classified into two types − Types of Ethernet Classic Ethernet Hub-based Shared medium 3-10 Mbps Switched Ethernet Switch-based Dedicated connections Higher speeds What are Classic Ethernet and Switched Ethernet? Classic Ethernet is the original ...

Read More
Showing 131–140 of 941 articles
« Prev 1 12 13 14 15 16 95 Next »
Advertisements