
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

6K+ Views
When connectionless service is offered, packets are frequently called Datagrams (just like telegrams) because individual packets are injected to the subnet and are routed individually.No advance setup is required. Subnets are called Datagram subnets. When Connection oriented service is provided, then before any packet is sent a path from source router to destination router is established. This connection is called Virtual Circuit and the subnet is called Virtual Circuit subnet.The implementation of connectionless service is diagrammatically represented as follows −Datagram NetworkLet us discuss how datagram network works in stepwise manner −Step 1 − Suppose there is a process P1 on ... Read More

2K+ Views
Let us understand what a Wi-Fi Direct mode is.Wi-Fi Direct ModeThe Wi-Fi Direct is built upon the same Wi-Fi technology used by most modern consumer electronic devices to communicate with wireless routers. It allows two devices to communicate with each other, provided that at least one of them is compliant with the standard to establish a peer-to-peer connection. Wi-Fi Direct is supported by more devices than most people realize.This mode is shown below −Here, 1 is the Printer2 is the Computer with a wireless interface3 is the Mobile or Another wireless device.Ad-Hoc modeCollections of computers are associated so that they ... Read More

19K+ Views
802.11 architecture uses two types of modes, which are as follows −Infrastructure ModeThe most popular mode used to connect clients like laptops and smartphones to another network such as company intranet or internet.This mode is shown below −In infrastructure mode every client is associated with an Access point which is in turn connected to another network. The client sends and receives its packet via Access Point.Ad-Hoc ModeCollections of computers are associated so that they can directly send frames to each other. There is no Access Point in Ad hoc, because Internet access is the killer application for wireless. Ad hoc ... Read More

569 Views
Ethernet is a way of connecting computers together in LAN, it is the most widely used method of linking computers together in LANs. The basic idea of its design is that multiple computers have access to it and can send data at any time.Token Ring is also a computer networking technology which is used to build local area networks where all stations are connected in a ring topology and pass one or more tokens for channel acquisition.EthernetThe performance of Ethernet under light traffic load is explained below in stepwise manner −Step 1 − Ethernet is a computer networking technology which ... Read More

3K+ Views
Ethernet was developed at Xerox PARC between 1973 and 1974. Engineer Bob Metcalfe invented it for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed laser printers.It was originally intended to create a network in a small area known as a Local Area Network (LAN).In 1983 the first iteration of Ethernet 10Base 5, was released.In 1985 thin coaxial cable was approved and the group made changes to the specification in 1987, 1990 and 1993.In 1995 so called Fast Ethernet introduced it contains speed and duplex mode (both side transmitting at same time)In 1998 ... Read More

1K+ Views
The collision free protocols are of three type and they are as follows −Bit map protocolToken passingBinary countdownNow let see about binary countdown protocol −Binary CountdownThe binary countdown is explained below in stepwise manner −Step 1 − A problem with the bit map protocol and token passing is that overhead is 1 bit per station, so bitmap and token passing will not suit the networks with thousands of stations.Step 2 − A station wants to use the channel. It has to broadcast its address as a binary bit string starting with a high order bit.Step 3 − All addresses are ... Read More

3K+ Views
Bit map protocol is called collision free Protocol. In bitmap protocol, each contention period consists of exactly N slots. If any station has to send a frame, then it transmits a 1 bit in the respective slot.Bitmap AlgorithmThe algorithm of Bit Map protocol is explained below −Step 1 − We use the bitmap or the bit vector which represents a finite set of distinct integers.Step 2 − To sort the array of integers, initialization of the array size to the specified range is needed and then fill it with zeroes which is a default value in the program followed by ... Read More

2K+ Views
Carrier Sense Multiple Access (CSMA) is a random-access protocol (multiple access protocol) that is used to minimise the chance of collision and increase performance. The main principle used is 'sense before transmit'. CSMA is using a shared medium which means any data passed with a common interconnection network.The Carrier Sense Multiple Access (CSMA) Protocol is diagrammatically represented as follows −Suppose the sender places a frame without sensing the status of the channel it will lead a collision with other nodes, if the other node also sends frames to the shared memory. So we sense before transmitting.There are mainly two conditions ... Read More

5K+ Views
Carrier Sense Multiple Access (CSMA) is a random-access protocol (multiple access protocol) that is used to minimise the chance of collision and increase performance. The main principle used is 'sense before transmit'. CSMA is using a shared medium which means any data passed with a common interconnection network.The Carrier Sense Multiple Access (CSMA) Protocol is diagrammatically represented as follows −Suppose the sender places a frame without sensing the status of the channel it will lead a collision with other nodes, if the other node also sends frames to the shared memory. So we sense before transmitting.There are mainly two conditions ... Read More

3K+ Views
Protocols in which stations listen for a carrier and act accordingly are called Carrier Sense Protocols. Multiple Access tells the fact that multiple nodes send and receive on the medium.Transmissions of one node are received by all other nodes using the medium. Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared physical medium, such as an electrical bus, or a band of electromagnetic spectrum.Carrier Sense Multiple Access (CSMA) ProtocolsThe three protocols that discuss the various implementations are as follows −1-persistent CSMANon- ... Read More