MCA Articles

Page 53 of 95

What are wireless networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 3K+ Views

A wireless network is a computer network that uses radio waves, infrared, or other wireless communication technologies to connect devices without physical cables. Digital wireless communication has evolved from early systems like Morse code to modern high-performance networks that enable seamless connectivity across various distances and applications. Wireless networks eliminate the need for physical cabling infrastructure, providing mobility, flexibility, and easier installation in environments where running cables would be impractical or expensive. Wireless Network Communication Device A ...

Read More

What is baseband transmission in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 7K+ Views

Baseband transmission is a digital communication method where data is transmitted using the original frequency range of the signal without shifting it to higher frequency bands. In this transmission technique, the entire bandwidth of the communication channel is occupied by a single signal. Unlike passband transmission where signals are modulated to higher frequencies, baseband transmission sends digital data directly using its natural frequency spectrum. This makes it ideal for short-distance communication within local networks. How Baseband Transmission Works The process begins with line encoding, where digital bits are converted into electrical signals. The most common encoding scheme ...

Read More

What are elementary data link layer protocols?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 33K+ Views

Elementary data link layer protocols are fundamental communication protocols that establish reliable data transmission between directly connected nodes. These protocols handle frame delivery, error detection, and flow control at the data link layer of the network stack. Elementary data link protocols are classified into three categories based on their complexity and capabilities: Protocol 1 − Unrestricted simplex protocol Protocol 2 − Simplex stop and wait protocol Protocol 3 − Simplex protocol for noisy channels Unrestricted Simplex Protocol The unrestricted simplex protocol represents the most basic form of data transmission. Data flows in one direction ...

Read More

What is the character count? Explain with an example?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 13K+ Views

Data link layer translates the physical layer's raw bit stream into discrete messages called frames. The key challenge is determining how a frame can be transmitted so the receiver can recognize the start and end of each frame. Frame Delimitation Techniques The techniques used to identify frame boundaries are: Character count − Uses a header field to specify frame length Flag byte with byte stuffing − Uses special delimiter bytes Starting and ending flag with bit stuffing − Uses bit-level delimiters Encoding violation − Uses invalid signal patterns as delimiters Character Count Method ...

Read More

What is physical layer coding violation?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 5K+ Views

The Physical Layer Coding Violation is a framing technique used in data communication to identify frame boundaries by intentionally violating the normal encoding rules of the physical layer. This method leverages the redundancy built into certain encoding schemes to create distinct markers for frame delimitation. How It Works This technique is specifically used in networks where the physical medium encoding contains redundancy, such as in Manchester encoding. In Manchester coding, each data bit is represented by two physical bits, creating natural redundancy that can be exploited for framing purposes. Manchester Encoding and Coding ...

Read More

How to do Fuzzy Matching on Pandas Dataframe Column Using Python?

AmitDiwan
AmitDiwan
Updated on 16-Mar-2026 2K+ Views

Fuzzy matching is a technique for finding approximate string matches in datasets where exact matches may not exist due to variations in spelling, formatting, or data entry errors. In pandas DataFrames, fuzzy matching helps identify similar entries across columns or datasets using similarity algorithms. The fuzzywuzzy library provides fuzzy string matching capabilities using Levenshtein distance to calculate similarity ratios between strings. We'll demonstrate matching car names between two DataFrames using a similarity threshold of 70%. Setting Up the Data First, let's create two DataFrames with similar but not identical car names: import pandas as pd ...

Read More

What is traffic aware routing in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 5K+ Views

Traffic-aware routing is a congestion control approach that dynamically adjusts routing decisions based on current network load conditions. Unlike traditional routing algorithms that only consider static metrics like hop count or bandwidth, traffic-aware routing incorporates real-time traffic information to make more intelligent path selection decisions. The main goal of traffic-aware routing is to identify the best routes by considering both static parameters (bandwidth, propagation delay) and dynamic factors (current load, queuing delay). By setting link weights as a function of these combined metrics, the algorithm can distribute traffic more evenly across the network. Traffic-Aware ...

Read More

What is an admission control approach for congestion control?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

An admission control approach is a proactive congestion control technique used primarily in virtual-circuit networks. It prevents network congestion by carefully evaluating whether new connections can be established without overloading the network resources. The fundamental principle is simple: do not set up a new virtual circuit unless the network can carry the added traffic without becoming congested. This approach acts as a gatekeeper, ensuring that only sustainable traffic loads are admitted into the network. Admission Control Process New Request ...

Read More

What is Traffic Throttling in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

Traffic throttling is a congestion control mechanism used in computer networks where senders adjust their transmission rates to match the network's capacity. The goal is to operate the network just before congestion occurs, maximizing throughput while preventing packet loss and delays. Traffic throttling approaches can be implemented in both datagram and virtual-circuit networks. These mechanisms help maintain network stability by proactively managing data flow before congestion becomes severe. Each traffic throttling approach must solve two fundamental problems: Problem 1: Congestion Detection Routers must determine when congestion is approaching, ideally before it occurs. Each router continuously monitors ...

Read More

What are transmission and propagation delay?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

Network delay is defined as how much time it takes for data to travel from one node to another node in a network. Understanding network delay is crucial for optimizing network performance and predicting data transfer times. Network delay can be divided into the following components: Transmission delay − Time to push all packet bits onto the transmission medium Propagation delay − Time for bits to travel through the physical medium to reach the destination Transmission vs Propagation Delay Sender ...

Read More
Showing 521–530 of 941 articles
« Prev 1 51 52 53 54 55 95 Next »
Advertisements