MCA Articles

Page 2 of 95

Character - Oriented Framing and Bit - Oriented Framing

Nancy Den
Nancy Den
Updated on 16-Mar-2026 13K+ Views

Framing is a Data Link layer function that encapsulates packets from the Network Layer into frames. Data frames can be of fixed or variable length. In variable-length framing, frame sizes may differ, so a pattern of bits serves as a delimiter to mark frame boundaries. The two types of variable-sized framing are: Character-oriented framing Bit-oriented framing Character-Oriented Framing In character-oriented framing, data is transmitted as a sequence of bytes using an 8-bit coding system like ASCII. This approach treats data as a stream of characters rather than individual bits. ...

Read More

Constraint length of the Convolutional Code

Nitya Raut
Nitya Raut
Updated on 16-Mar-2026 4K+ Views

Convolutional codes are error correcting codes where data streams of indefinite lengths are encoded before transmission over noisy channels. The message streams are encoded by the sliding application of Boolean functions that generate a sequence of output bits. Convolutional codes were first introduced in 1955 by Elias. After extensive research by mathematicians, Viterbi developed an algorithm for maximum likelihood decoding in 1973, called the Viterbi algorithm, which led to modern convolutional codes. Parameters in Convolutional Codes For generating a convolutional code, information is passed sequentially through a linear finite-state shift register. The shift register comprises of K-bit ...

Read More

Hard and Soft Decision Decoding

Nancy Den
Nancy Den
Updated on 16-Mar-2026 11K+ Views

A challenging task in error correction is decoding the codewords that have been received via noisy channels. Before data is transmitted, the sender adds redundant bits or parity bits to the message forming codewords. The codewords are then transmitted via computer networks. The receiver checks the incoming codewords and performs the decoding or error correction process to retrieve the original data. If there are no errors, i.e. the codewords find an exact matching, then it is easy to decode the data by eliminating the parity bits. However, if a match is not found, then more complex decoding mechanisms are ...

Read More

Connectionless Services

Arushi
Arushi
Updated on 16-Mar-2026 5K+ Views

A Connectionless service is a data communication method between two nodes where the sender transmits data without establishing a dedicated connection or ensuring the receiver's availability. In this model, each data packet contains complete destination addressing information and is routed independently of other packets through the network. Unlike connection-oriented services, connectionless communication requires no initial handshake or connection setup. Data packets, called datagrams, may take different paths to reach their destination, with the network making routing decisions independently for each packet. Connectionless Service - Independent Packet Routing Sender ...

Read More

Link Control Protocol (LCP)

karthikeya Boyini
karthikeya Boyini
Updated on 16-Mar-2026 6K+ Views

Link Control Protocol (LCP) is a crucial component of the Point-to-Point Protocol (PPP) that operates at the data link layer. It is responsible for establishing, configuring, testing, maintaining, and terminating point-to-point links for data transmission. LCP also handles negotiation of setup options and features between the two endpoints of a communication link. How It Works When PPP initiates communication, it sends LCP packets before establishing connections over the point-to-point link. These LCP packets test the communication line to determine if it can handle the required data volume at the specified speed. Based on this assessment, LCP negotiates the ...

Read More

Collision-Free Protocols

Arushi
Arushi
Updated on 16-Mar-2026 20K+ Views

In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled. This event is called collision. The Medium Access Control (MAC) layer of the OSI model is responsible for handling collision of frames. Collision-free protocols are devised so that collisions do not occur. Protocols like CSMA/CD and CSMA/CA nullify the possibility of collisions once the transmission channel is acquired by any station. However, collision can still occur during the contention period if more than one station starts to transmit at the same time. Collision-free protocols resolve collision in the ...

Read More

Bit-Map Protocol

Vikyath Ram
Vikyath Ram
Updated on 16-Mar-2026 5K+ Views

Bit-map protocol is a collision-free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. This is an example of a Reservation Protocol, where stations reserve the channel before data transmission begins. Working Principle In this protocol, the contention period is divided into N slots, where N is the total number of stations sharing the channel. If a station ...

Read More

The Adaptive Tree Walk Protocol

Nishtha Thakur
Nishtha Thakur
Updated on 16-Mar-2026 9K+ Views

The Adaptive Tree Walk Protocol is a channel access technique for shared communication channels that dynamically combines the advantages of collision-based protocols (like ALOHA) and collision-free protocols. It adapts to network load conditions by organizing stations in a hierarchical tree structure. In computer networks, when multiple stations transmit simultaneously over a shared channel, their data collides and becomes garbled. Collision-based protocols like ALOHA allow all stations to transmit freely without checking channel availability, which works well under light loads. Collision-free protocols resolve channel access through contention periods, eliminating collisions but adding overhead that benefits heavy loads. The Adaptive ...

Read More

Architecture of Classic Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in the 1980s as the IEEE 802.3 standard. Ethernet is classified into two categories: classic Ethernet and switched Ethernet. Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred to as 10BASE-X. Here, 10 is the maximum throughput (10 Mbps), BASE denotes use of baseband transmission, and X is the type of medium used. Architecture Classic Ethernet is the simplest form of Ethernet. It comprises an Ethernet ...

Read More

Switched Ethernet vs. Classic Ethernet

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s as IEEE 802.3 standard. Ethernet can be broadly classified into two types − Types of Ethernet Classic Ethernet Hub-based Shared medium 3-10 Mbps Switched Ethernet Switch-based Dedicated connections Higher speeds What are Classic Ethernet and Switched Ethernet? Classic Ethernet is the original ...

Read More
Showing 11–20 of 941 articles
« Prev 1 2 3 4 5 95 Next »
Advertisements