Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Page 30 of 94
What is DSL technology and differentiate between DSL modem and DSLAM?
The DSL technology is defined as the digital subscriber lines. Here, the data is transmitted to the users over the telephone signal lines.Voice communication over the telephone is the best example of the digital subscriber lines. Also, there are DSL services that are provided by DSL technology.Here there is asymmetric and symmetric digital subscriber line both are supported by the DSL network.The services provided by the companies that provide the DSL are −The broadband internet connectionVoice communicationVideo streaming at low speed is offered by the companies using the DSL network.Purpose of DSLThe purposes of DSL are explained below −DSL is ...
Read MoreWhat are the different types of ISDN?
ISDN stands for integrated service digital network. It is a telephone switched network which integrates voice and data over a digital line simultaneously. It also provides packet switched networks.ISDN supports a variety of services which are as follows −Voice callsVideo textsElectronic mailDatabase accessFacsimileTeletextData transmission and voiceConnection to internetElectronic Fund transferImage and graphics exchangeDocument storage and transferAudio and Video ConferencingThe figure given below depicts ISDN −Channels of ISDNISDN has mainly three channels, which are as follows −B-channel − It offers a speed of around 64kbps, which can be used for home purpose.D-channel − It offers speeds ranging from 16 to 64 ...
Read MoreDifferentiate between piconet and scatternet
Let us understand the concept of piconet and scatternet before learning the differences between them.PiconetA piconet is a network created by connecting multiple wireless devices using Bluetooth technology. In a piconet network a master device exists, this master device cm gets connected to 7 more slave devices.It includes the master the number of devices that can be connected is limited to 8. Due to less number of devices active at a time the usage of channel band width is not more.Number of devices that can be connected is limited to 8. It is applicable for devices belonging to small areas.Given ...
Read MoreWhat are the types of ICMP message types?
Internet Control Message Protocol (ICMP) shares error reporting and device status messages which can be further divided into specific message types with their codes.These message types can be divided into two categories −Error Reporting MessagesQuery MessagesThese message types are shown below −Error Reporting MessagesThese are messages which are sent when an error is reported by ICMP protocol.Some of common messages under this category are as follows:Destination Unreachable (Type 3)One of the most common error reporting messages occurs when the router is unable to locate the path of the packet where it is needed to be delivered and in this case ...
Read MoreWhat are security issues in IP protocol?
There are three security issues that are applicable to the IP protocol −Packet SniffingPacket ModificationIP SpoofingLet us discuss each issue in detail.Packet SniffingA guest may intercept an IP packet and create a copy of it.The packet sniffing is generally a passive attack, where the attacker does not change the contents of the packet.Packet sniffing attack is difficult to detect because here the sender and receiver doesn’t know that the packet has been copied.Even though the packet sniffing cannot be stopped, the encryption of the packet can make the attacker’s effort useless. Still the attackers may sniff the packet, but the ...
Read MoreWhat are issues in congestion and Flow control in LANs?
Let us understand the concept of flow control and congestion control.Flow controlIt is handled by a receiving side and it safeguards that a sender can only send something that a receiver can control or handle.Flow control handles a mechanism available to safeguard that communication flows smoothly.For example, a situation where somebody has a quick fiber connection could be sending on something or dial up similar. A sender could have the capability to send packets quickly, however that can be useless to a receiver on dialup. Thus they require a method to throttle the sending side.The issues related to flow control ...
Read MoreWhat are issues in congestion control and how is it handled in TCP/IP?
The Congestion at the network layer came across two issues which are throughput and delay.Based on DelayWhen compared to capacity of the network, if load is less, the delay is minimum.Here the minimum delay is composed of propagation delay and processing delay and both are negligible.Therefore, when load reaches the network capacity, the delay increases because we must add the queuing delay to the total delay.When the load is greater than the capacity the delay becomes infinite.Based on ThroughoutWhen load is below the capacity of the network, the throughput increases proportional to the load.After the load reaches the capacity, we ...
Read MoreWhat is delay, the performance metric of the network layer?
The performance of a network can be measured in terms of Delay, Throughput and Packet loss.Let us try to understand the concept of Delay.DelayA packet from its source to its destination, encounters delays. The delays in a network can be divided into four types as follows −Transmission delayTransmission delay is the amount of time taken by the router to transfer the packet to the outgoing link is called transmission delay.For example, assume that you have 100 kb of data. For this data, you have to keep on this outgoing link and this is known as Transmission delay.Suppose you are vacating ...
Read MoreWhat is protocol graph? Compare the network interface and protocol
A protocol is a set of rules and standards that primarily outline a language that devices will use to communicate. There are an excellent range of protocols in use extensively in networking, and that they are usually implemented in numerous layers.It provides a communication service where the process is used to exchange the messages. When the communication is simple, we can use only one simple protocol.When the communication is complex, we must divide the task between different layers, so, we need to follow a protocol at each layer, this technique we used to call protocol layering. This layering allows us ...
Read MoreWhat is Protocol Layering?
A protocol is a set of rules and standards that primarily outline a language that devices will use to communicate. There are an excellent range of protocols in use extensively in networking, and that they are usually implemented in numerous layers.It provides a communication service where the process is used to exchange the messages. When the communication is simple, we can use only one simple protocol.When the communication is complex, we must divide the task between different layers, so, we need to follow a protocol at each layer, this technique we used to call protocol layering. This layering allows us ...
Read More