MCA Articles

Page 54 of 95

What is three-bit sliding window protocol?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

Sliding window protocol is a transmission control protocol used for reliable data communication. Both sender and receiver maintain finite buffers to hold outgoing and incoming packets, with every packet requiring acknowledgment from the receiver. The sender maintains a timer for every packet sent, and any unacknowledged packet within a certain time is retransmitted. The sender can transmit a complete window of packets before receiving acknowledgment for the first packet, leading to higher transfer rates as multiple packets are sent without waiting for individual acknowledgments. The receiver advertises a window size that tells the sender how much data it ...

Read More

What are the services provided by the Network Layer?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 15K+ Views

The Network Layer is the third layer in the OSI model of computer networking. It handles packet forwarding, routing through routers, and quality of service management. This layer acts as an intermediary between the transport layer and the data link layer, providing essential services for end-to-end communication across networks. Nature of the Service The transport layer at the host receives services from the network layer, but there's an important distinction: the transport layer resides in end hosts, while the network layer operates within the subnet. The subnet is a collection of routers containing only the bottom three OSI ...

Read More

What is the concept of flow and error control and their differences?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 6K+ Views

Flow control and error control are two fundamental mechanisms in computer networks that ensure reliable data transmission between sender and receiver. While both are essential for maintaining data integrity during communication, they serve distinct purposes in network protocols. Error Control Error control is concerned with ensuring that all frames are delivered to the destination correctly and possibly in order. It focuses on detecting and correcting transmission errors that may occur due to noise, interference, or other factors in the communication channel. To ensure reliable delivery, error control requires three key components: Acknowledgement Reliable delivery is ...

Read More

What is a static channel allocation in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 3K+ Views

In wireless networks, a channel can be allocated between source and destination. The communication path consists of multiple routers connected in a peer-to-peer manner, and the entire channel encompasses these network elements. Channel allocation schemes determine how available bandwidth is distributed among users. Channel allocation is fundamental to network performance, as it directly affects how efficiently the available spectrum is utilized and how well the network can handle varying traffic demands. Types of Channel Allocation The different types of channel allocation schemes are as follows: Static channel allocation − Fixed allocation of bandwidth portions to ...

Read More

What are different types of multiple access protocols?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 2K+ Views

Multiple access protocols are used to coordinate access to shared communication channels, where multiple nodes regulate their transmission onto broadcast channels. These protocols are essential in both wired and wireless LANs, as well as satellite networks. When multiple nodes transmit frames simultaneously, collisions occur at the receiver. During a collision, transmitted frames are lost and no acknowledgement is sent, wasting the broadcast channel during the collision interval. Multiple access protocols solve this fundamental problem by providing structured methods for channel sharing. Multiple Access Protocol Classification Random Access ...

Read More

What is slotted ALOHA in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 4K+ Views

ALOHA is a random access protocol used in packet switching networks for managing how multiple stations share a common communication channel. The protocol is named after the Hawaiian greeting "Aloha" and was developed at the University of Hawaii. There are two main variants of the ALOHA protocol: Pure ALOHA − Stations can transmit data at any time Slotted ALOHA − Stations can only transmit at specific time intervals What is Slotted ALOHA? Slotted ALOHA is an improved version of Pure ALOHA that reduces collisions by organizing transmission times into discrete time slots. In this ...

Read More

What is Ethernet evolution in computer networks?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 4K+ Views

Ethernet was developed at Xerox PARC between 1973 and 1974. Engineer Bob Metcalfe invented it for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed laser printers. It was originally intended to create a network in a small area known as a Local Area Network (LAN). Ethernet has since evolved to become the dominant wired networking technology worldwide. Ethernet Evolution Timeline 1983 − The first iteration of Ethernet 10Base-5 was released, operating at 10 Mbps using thick coaxial cable. 1985 − Thin coaxial cable (10Base-2) was ...

Read More

What is the performance of ethernet and token ring under light traffic load?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 1K+ Views

Ethernet is a widely used computer networking technology for connecting devices in Local Area Networks (LANs). It allows multiple computers to access a shared medium and transmit data using Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Token Ring is a networking technology that connects stations in a ring topology, where data transmission is controlled by passing a special frame called a token around the ring. Ethernet vs Token Ring Topology Ethernet (Bus) Node Node ...

Read More

Differentiate between infrastructure mode and the ad hoc mode of IEEE 802.11

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 20K+ Views

IEEE 802.11 architecture supports two fundamental modes of operation that define how wireless devices communicate with each other. Understanding these modes is crucial for network deployment and management. Infrastructure Mode Infrastructure mode is the most widely used wireless networking configuration where all wireless clients connect through a central Access Point (AP). The AP serves as a bridge between the wireless network and other networks such as the internet or corporate intranet. Infrastructure Mode Access Point ...

Read More

What is Implementation of connection less services?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 7K+ Views

Connectionless service is a network communication method where packets are sent independently without establishing a dedicated path beforehand. In this service model, packets are often called datagrams because each packet is individually injected into the network and routed independently, similar to how telegrams are sent. Unlike connection-oriented services that require establishing a virtual circuit before data transmission, connectionless services require no advance setup. Networks using this approach are called datagram networks or datagram subnets. Connectionless Service Implementation Host H1 ...

Read More
Showing 531–540 of 941 articles
« Prev 1 52 53 54 55 56 95 Next »
Advertisements