MCA Articles

Page 17 of 95

Spanning Tree Protocol

Moumita
Moumita
Updated on 16-Mar-2026 7K+ Views

Spanning Tree Protocol (STP) is a communication protocol operating at the data link layer of the OSI model to prevent bridge loops and the resulting broadcast storms. It creates a loop-free topology for Ethernet networks. Working Principle A bridge loop is created when there are more than one paths between two nodes in a given network. When a message is sent, particularly when a broadcast is done, the bridges repeatedly rebroadcast the same message flooding the network. Since a data link layer frame does not have a time-to-live field in the header, the broadcast frame may loop forever, ...

Read More

The IEEE 802.1Q Standard

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

The IEEE 802.1Q networking standard defines the specifications for VLANs (Virtual Local Area Networks) on IEEE 802.3 Ethernet networks. Commonly referred to as Dot1Q, this standard enables network segmentation by creating logical groups of computers that appear to be on the same LAN, regardless of their physical network location. VLANs allow network administrators to partition networks based on functional requirements, where each VLAN comprises a subset of ports on single or multiple switches. This enables devices within a VLAN to communicate as if they were on a separate physical LAN, providing improved security, performance, and network management. Key ...

Read More

Multi-Protocol Label Switching (MPLS)

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Multiprotocol Label Switching (MPLS) is a routing technique that augments speed and control of network traffic by directing data from one node to the next based on short path labels. Instead of being routed using long network addresses, data packets are routed through path labels that identify virtual paths between nodes rather than endpoints. MPLS speeds up traffic flows by avoiding complex lookups in the routing table at each node as in conventional routing algorithms. MPLS is a scalable and protocol-independent routing technique. It works with Internet Protocol (IP), Ethernet, Frame Relay and Asynchronous Transport Mode (ATM). Despite the ...

Read More

Explain the ATM Cell Structure in Computer Network

Ginni
Ginni
Updated on 16-Mar-2026 8K+ Views

ATM (Asynchronous Transfer Mode) transfers data in fixed-size units called cells. Each cell consists of exactly 53 bytes: 5 bytes for the header containing routing and control information, and 48 bytes for the payload carrying user data. The fixed-size cell structure makes ATM particularly suitable for real-time applications like voice and video transmission, as it minimizes delays caused by waiting for large variable-length packets to be processed. ATM Cell Structure (53 Bytes) Header 5 Bytes Payload (User Data) 48 Bytes ...

Read More

What is the Structure of Management Information (SMI)?

Ginni
Ginni
Updated on 16-Mar-2026 4K+ Views

Structure of Management Information (SMI) defines the rules and standards for describing managed objects within the Simple Network Management Protocol (SNMP) framework. SMI provides the syntactic structure that allows network management systems to organize, access, and manipulate network device information consistently. In SNMP, managed objects reside in a virtual database called the Management Information Base (MIB). Collections of related objects are organized into MIB modules, which are written using a subset of Abstract Syntax Notation One (ASN.1). This notation describes data structures in a machine-independent language, enabling consistent communication across different network devices and platforms. SMI Data Types ...

Read More

What are the types of Firewalls in Computer Network?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic such as viruses and hackers. There are various types of firewalls in a computer network, each designed to provide different levels of security and functionality: Packet Filtering Firewalls Packet filtering firewalls are the most basic type of firewall that operates at the network layer (Layer ...

Read More

What are the FTP Connections?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

File Transfer Protocol (FTP) uses two separate connections to facilitate communication between client and server. Understanding these connections is crucial for comprehending how FTP operates efficiently for file transfers. Control Connection The control connection is established first and remains active throughout the entire FTP session. This connection handles all commands and responses between the client and server. The establishment process involves two steps: The server issues a passive open on the well-known port 21 and waits for a client connection. The client uses an ephemeral port and issues an active open to ...

Read More

How do you measure Network Performance?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 13K+ Views

The examination and review of collective network information to describe the quality of services delivered by the underlying computer network is known as network performance. It is a qualitative and quantitative procedure that assesses and defines a network's performance level. Network performance measurement assists administrators in reviewing, evaluating, and improving network services to ensure optimal user experience and efficient resource utilization. Parameters Used to Measure Network Performance The following key parameters are used to measure network performance: Bandwidth − Maximum data transfer capacity Throughput − Actual data transfer rate achieved Latency − Time delay for ...

Read More

What are the different types of Castings in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 7K+ Views

Transmitting data in the form of packets over the internet is called casting. It refers to the method used to deliver data from one or more sources to one or more destinations across a network. Types of Casting The different types of casting are as follows: Unicast − Transmitting data from one host to another host (one-to-one) Broadcast − Transmitting data from one host to many hosts (one-to-all) Multicast − Transmitting data from one host to a particular group of hosts (one-to-many) Types of ...

Read More

What is binary countdown protocol in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

The Binary Countdown Protocol is a collision-free medium access control method that resolves contention among multiple stations wanting to transmit simultaneously. It uses station addresses to determine transmission priority through a distributed arbitration process. This protocol belongs to the family of collision-free protocols, which includes: Bit-map protocol − Uses reservation bits Token passing − Circulates control tokens Binary countdown − Uses address-based arbitration How Binary Countdown Works The protocol operates through the following mechanism: Address Broadcasting − When a station wants to transmit, it broadcasts its address as a binary string, starting ...

Read More
Showing 161–170 of 941 articles
« Prev 1 15 16 17 18 19 95 Next »
Advertisements