MCA Articles

Page 81 of 95

Differences between Pure Aloha and Slotted Aloha

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 59K+ Views

The Aloha Protocol allows several stations to send data frames over the same communication channel at the same time. This protocol is a straightforward communication method in which each network station is given equal priority and works independently. Aloha is a medium access control (MAC) protocol for transmission of data via a shared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel. There are two types of Aloha protocols − Pure Aloha and Slotted Aloha. In this article, we will highlight the major differences between these two protocols ...

Read More

What are data link layer design issues?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 8K+ Views

The Data Link layer is located between physical and network layers. It provides services to the Network layer and receives services from the physical layer. The scope of the data link layer is node-to-node communication. OSI Layer Stack - Data Link Layer Position Network Layer Data Link Layer Physical Layer Services to Network Layer Services from Physical Layer Node-to-node communication scope The following are the ...

Read More

Error-Detecting Codes - Checksums

George John
George John
Updated on 16-Mar-2026 52K+ Views

When bits are transmitted over the computer network, they are subject to get corrupted due to interference and network problems. The corrupted bits lead to spurious data being received by the receiver and are called errors. Error detection techniques are responsible for checking whether any error has occurred in the frame that has been transmitted via network. They do not determine the number of error bits or the type of error, but simply detect the presence of corruption. For error detection, the sender needs to send some additional redundant bits along with the data bits. The receiver performs ...

Read More

Difference between Private and Public IP addresses

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 27K+ Views

An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address serves two primary functions: identifying a host or network interface, and providing location addressing to establish communication paths. IP addresses can be either Public or Private, each serving different networking purposes. Understanding this distinction is crucial for network configuration and security. Public vs Private IP Address Architecture Internet ...

Read More

Difference between LAN, MAN and WAN

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 28K+ Views

When several computers are connected together and are able to communicate with one another, it is called a computer network. Computer networks are designed to share data and information among the computers of the network. Depending on the operating geographical area, computer networks are of three major types, namely LAN, MAN, and WAN. All three computer networks are designed for the same purpose of sharing information among computers. However, they differ significantly in coverage area, speed, cost, and complexity, which we will explore in this article. Network Types by Coverage Area ...

Read More

Multifactor Authentication

Satadru Jati
Satadru Jati
Updated on 16-Mar-2026 369 Views

Multi-factor Authentication (MFA) is a security method that requires users to provide additional verification beyond their username and password. This could include entering a code sent to their phone, answering a security question, or using biometric authentication like fingerprint scanning. MFA provides a crucial additional layer of security − even if login credentials are compromised, unauthorized access is prevented by requiring the additional authentication factor that only the legitimate user should possess. Multi-Factor Authentication Process Something You Know Password Something ...

Read More

What are noiseless and noisy channels?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 40K+ Views

Data link layer protocols are categorized based on whether the transmission channel is noiseless or noisy. This classification determines the complexity of protocols required, with noiseless channels needing simpler protocols and noisy channels requiring sophisticated error control mechanisms. Data Link Layer Protocol Classification Noiseless Channels • Simplest Protocol • Stop & Wait No error control needed Noisy Channels • Stop & Wait ARQ • Go-Back-N ARQ • ...

Read More

Multiple Access Protocols in Computer Networks

Moumita
Moumita
Updated on 16-Mar-2026 39K+ Views

Multiple access protocols are a set of protocols operating in the Medium Access Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI) model. These protocols allow multiple nodes or users to access a shared network channel efficiently, enabling several data streams originating from different nodes to be transferred through a multi-point transmission medium. The primary objectives of multiple access protocols are optimization of transmission time, minimization of collisions, and avoidance of interference between transmissions. These protocols solve the fundamental problem of how multiple devices can share a single communication channel without data corruption. Categories of Multiple Access ...

Read More

Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)

Urmila Samariya
Urmila Samariya
Updated on 16-Mar-2026 62K+ Views

Network devices or networking hardware are the physical devices that are used for establishing connections and facilitating interaction between different devices in a computer network. Each device operates at specific layers of the OSI model and serves distinct purposes in network communication. Network Devices and OSI Layers Hub Repeater Bridge Switch Router Gateway Physical Data Link Network ...

Read More

Classful Vs Classless Addressing

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 53K+ Views

Classful addressing is the original IP addressing scheme introduced in 1981 as part of the Internet Protocol. It divides IP addresses into predefined classes based on the first few bits of the address. This system was later replaced by Classless Inter-Domain Routing (CIDR) in 1993 due to inefficient IP address utilization. An IP address consists of 32 bits divided into four 8-bit sections (octets) separated by dots. Each IP address is further divided into two parts: a Network ID that identifies the network and a Host ID that identifies the specific device within that network. Classful Address Classes ...

Read More
Showing 801–810 of 941 articles
« Prev 1 79 80 81 82 83 95 Next »
Advertisements