Network Articles

Page 64 of 66

What are the types of Parallelism in Computer Architecture?

Ginni
Ginni
Updated on 20-Jul-2021 4K+ Views

There are various types of Parallelism in Computer Architecture which are as follows −Available and Utilized ParallelismParallelism is the most important topics in computing. Architectures, compilers, and operating frameworks have been striving for more than two decades to extract and use as much parallelism as available to speed up computation.Available and Utilized ParallelismParallelism is the most important topics in computing. Architectures, compilers, and operating frameworks have been striving for more than two decades to extract and use as much parallelism as available to speed up computation.Functional Parallelism is that type of parallelism that raise from the logic of a problem ...

Read More

What is the difference between Concurrency and Parallel Execution in Computer Architecture?

Ginni
Ginni
Updated on 20-Jul-2021 825 Views

Concurrency ExecutionIt is the sensual behavior of the N-Client I-Server model where one client is served at any provided moment. This model has dual characteristics. It is sequential on a small time scale, but together on a rather large time scale.In this method, the elementary problem is how the competing clients, processors or threads, must be scheduled for service (Execution) through the single-level (processor). Scheduling policies can be oriented toward efficient service in terms of highest throughput (least intervention) or towards short average response time, and so on.The scheduling policy can be considered as covering two methods as first deals ...

Read More

What are different levels of abstraction in Computer Architecture?

Ginni
Ginni
Updated on 20-Jul-2021 5K+ Views

There are three different layers of abstraction in computer system such as the concrete architecture at the system level, the abstract and concrete architecture at the processor level, and the abstract and concrete architecture at the micro-machine level. Let us discuss each level one by one.Concrete Architecture of Computer SystemsAt the system level, the representation of the concrete architecture depends on processor level building blocks, including processors, memories, buses, etc. Its representation contains the description of the building blocks, the interpretation among them, and the services of the entire system. The figure shows an example of the system-level architecture of ...

Read More

What is Carrier Sense Multiple Access (CSMA)?

Moumita
Moumita
Updated on 21-Sep-2020 27K+ Views

Carrier Sense Multiple Access (CSMA) is a network protocol for carriertransmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and transmits if the channel is not busy. Using CMSA protocols, more than one users or nodes send and receive data through a shared medium that may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.Working PrincipleWhen a station has frames to transmit, it attempts to detect presence of the carrier signal from the other nodes connected to ...

Read More

EPC Gen 2 Tag Identification Layer

Moumita
Moumita
Updated on 03-Jun-2020 770 Views

Tag identification layer of Electronic Product Code (EPC) Gen 2 lays down the method by which the readers can receive the identifiers from the tags. EPC Gen 2 (second generation) RFID (Radio Frequency Identification) network has two main components, tags and readers. RFID tags are affixed on objects with EPC encoded on them for identification. EPC helps to check identities of objects like inventory, assets and people, and track them. Readers are the intelligent part of the system that tracks the tags. The tag identification layer addresses the multiple access problem of getting messages from unknown number of tags.Working PrincipleIn ...

Read More

What is backscatter?

Moumita
Moumita
Updated on 03-Jun-2020 2K+ Views

Backscatter is a method that uses an incident radio-frequency (RF) signal to transmit data without a battery or power source. It employs passive reflection and modulation of the incoming RF signal, and converts it into tens or hundreds of microwatts of electricity, that can be encoded for data communications.It differs from other wireless communications since the communication is half duplex in nature, i.e. both the sender and receiver cannot transmit simultaneously. The mains advantage of backscattering is that it’s low energy requirements and low complexity of deployment.Architecture of backscatter communicationsA basic backscatter communication system has two main components: tags, and ...

Read More

EPC Gen 2 Physical Layer

Moumita
Moumita
Updated on 03-Jun-2020 639 Views

Physical layer of Electronic Product Code (EPC) Gen 2 defines method of transmission of bits across the network. EPC is a universal identifier encoded on RFID (Radio Frequency Identification) tags to check identities of objects like inventory, assets and people, and track them. The second generation of this technology, as laid down by EPCglobal Tag Data Standard, is called EPC Gen 2.EPC Gen 2 RFID network has two main components, tags and readers. Tags are affixed on objects that enables them to be identified or tracked. Readers are the intelligent part of the system that tracks the tags. The physical ...

Read More

Adaptive Frequency Hopping

Moumita
Moumita
Updated on 22-May-2020 639 Views

Bluetooth communication networks are prone to signal interferences in environments where other wireless networks coexist. The problem is aggravated when they use the same frequency bands. Bluetooth technology and IEEE 802.11 networks, like Wireless LANs (WLANs) and WiFi, operate in the same unlicensed 2.4 GHz ISM (Industrial, Scientific, and Medical) radio band. In order to reduce the impact of these interferences, Adaptive Frequency Hopping (AFH) was introduced by Bluetooth Special Interest Group (SIG).In Adaptive Frequency Hopping, when a Bluetooth device is introduced in the network, it identifies the channels that are presently fixed for communication by WiFi or WLANs. It ...

Read More

What is piconet?

Moumita
Moumita
Updated on 27-Apr-2020 7K+ Views

A piconet is a small Bluetooth network that connects mobile devices wirelessly over a short range of 10m radius, using ultra-high frequency (UHF) radio waves, to form a personal area network (PAN).A piconet can be formed by at most 8 stations, one of which is the master node and the rest slave nodes. Thus, it can accommodate a maximum of 7 slaves. The master node is the primary station that manages the small network. The slave stations are secondary stations that are synchronized with the primary station.Communication can take place between a master node and a slave node in either ...

Read More

What is scatternet?

Moumita
Moumita
Updated on 27-Apr-2020 6K+ Views

A scatternet is a type of Bluetooth network that is formed by the interconnection between two or more individual Bluetooth networks, called piconets. The devices in the scattered should be Bluetooth enabled so that they can communicate wirelessly over a short range of within 10m radius using ultra-high frequency (UHF) radio waves.In a scatternet, there must be at least two piconets. The nodes in a scatternet may be of three types −Master Node − It is the primary station in each piconet that controls the communication within that piconet.Slave Node − A slave is a secondary station in a piconet ...

Read More
Showing 631–640 of 655 articles
Advertisements