Positive Acknowledgement with Retransmission (PAR)

Arjun Thakur
Updated on 16-Mar-2026 23:36:12

3K+ Views

Positive Acknowledgement with Retransmission (PAR) is a group of error-control protocols for transmission of data over noisy or unreliable communication networks. These protocols reside in the Data Link Layer and Transport Layer of the OSI model. They provide automatic retransmission of frames that are corrupted or lost during transit. PAR is also called Automatic Repeat Request (ARQ). PAR protocols are used to provide reliable transmissions over unreliable network services. They are commonly implemented in wireless communication systems like GSM networks, where signal interference and packet loss are frequent challenges. Working Principle In PAR protocols, the receiver sends ... Read More

Logical Link Control (LLC)

Moumita
Updated on 16-Mar-2026 23:36:12

13K+ Views

The Logical Link Control (LLC) is the upper sublayer of the data link layer in the OSI reference model. It acts as an interface between the network layer and the medium access control (MAC) sublayer of the data link layer. The LLC sublayer is primarily used for its multiplexing capabilities, allowing multiple network protocols to operate simultaneously within a multipoint network over the same network medium. LLC Layer in the OSI Model The data link layer is divided into two sublayers to handle different aspects of data transmission: Logical Link Control (LLC) sublayer − ... Read More

What are elementary data link layer protocols?

Bhanu Priya
Updated on 16-Mar-2026 23:36:12

33K+ Views

Elementary data link layer protocols are fundamental communication protocols that establish reliable data transmission between directly connected nodes. These protocols handle frame delivery, error detection, and flow control at the data link layer of the network stack. Elementary data link protocols are classified into three categories based on their complexity and capabilities: Protocol 1 − Unrestricted simplex protocol Protocol 2 − Simplex stop and wait protocol Protocol 3 − Simplex protocol for noisy channels Unrestricted Simplex Protocol The unrestricted simplex protocol represents the most basic form of data transmission. Data flows in one direction ... Read More

Ethical Hacking Roadmap - 5 Phases to Success

Uday Mitra
Updated on 16-Mar-2026 23:36:12

981 Views

Security breaches have become a critical challenge for modern organizations. Price Waterhouse Coopers' "The Global State of Information Security Survey 2018" reveals that over 32% of 9, 500 interviewed executives believe their product quality is vulnerable to damage, while 39% are concerned about the loss or compromise of critical data. With cybersecurity affecting company reputation and business continuity, leaders like Tesla's Elon Musk prioritize security as more than just an IT issue. This has led to increased demand for ethical hackers who can proactively identify and fix vulnerabilities before malicious attackers exploit them. What is Ethical Hacking? ... Read More

Tap and Go: Discovering the Wonders of Near Field Communication (NFC)

sudhir sharma
Updated on 16-Mar-2026 23:36:12

427 Views

In today's fast-paced world, Near Field Communication (NFC) has revolutionized the way we interact and connect with electronic devices. As a short-range wireless connectivity technology, NFC enables communication between two electronic devices over a distance of 4 cm or less, making tasks like contactless payments swift and secure. NFC operates at a frequency of 13.56 MHz and uses electromagnetic induction to establish communication. Unlike other wireless technologies, NFC can interact with both powered devices (like smartphones) and unpowered devices (like passive NFC tags embedded in posters or stickers). NFC Communication Range and Process ... Read More

What is BISDN in Computer Network?

Ginni
Updated on 16-Mar-2026 23:36:12

10K+ Views

The B-ISDN (Broadband Integrated Services Digital Network) is a virtual circuit-switched network that can use high-speed packet switching services. B-ISDN uses a flexible multiplexing format called ATM (Asynchronous Transfer Mode) to deliver broadband services over digital networks. B-ISDN represents an evolution from the original ISDN, designed to handle high-bandwidth applications like video conferencing, multimedia communications, and high-speed data transfer that require significantly more capacity than traditional voice services. B-ISDN Service Classification Interactive Services Distribution Services ... Read More

What is the character count? Explain with an example?

Bhanu Priya
Updated on 16-Mar-2026 23:36:12

13K+ Views

Data link layer translates the physical layer's raw bit stream into discrete messages called frames. The key challenge is determining how a frame can be transmitted so the receiver can recognize the start and end of each frame. Frame Delimitation Techniques The techniques used to identify frame boundaries are: Character count − Uses a header field to specify frame length Flag byte with byte stuffing − Uses special delimiter bytes Starting and ending flag with bit stuffing − Uses bit-level delimiters Encoding violation − Uses invalid signal patterns as delimiters Character Count Method ... Read More

What is the difference between a Control Plane and a Data Plane?

Ginni
Updated on 16-Mar-2026 23:36:12

1K+ Views

In networking, routers and switches operate using distinct functional layers called planes. The two most important planes are the control plane and the data plane, each serving different but complementary roles in network operations. Control Plane The control plane is the "brain" of network devices that makes intelligent decisions about how data should flow through the network. It handles routing protocols, maintains routing tables, and establishes communication paths between network devices. Key functions of the control plane include: Routing protocol processing − Running protocols like OSPF, BGP, and RIP to exchange routing information ... Read More

What are the types of Hubs in the Computer Network?

Ginni
Updated on 16-Mar-2026 23:36:12

6K+ Views

A hub is a networking device used to connect multiple devices in a network, creating a single collision domain where all connected devices share the same bandwidth. Hubs operate at the Physical Layer (Layer 1) of the OSI model and simply repeat incoming signals to all connected ports. There are three main types of hubs based on their functionality and features: Passive Hub Passive hubs are the simplest networking devices that contain no electronic components or signal processing capabilities. They act as simple connection points that physically join network cable segments together without amplifying or regenerating signals. ... Read More

What is physical layer coding violation?

Bhanu Priya
Updated on 16-Mar-2026 23:36:12

6K+ Views

The Physical Layer Coding Violation is a framing technique used in data communication to identify frame boundaries by intentionally violating the normal encoding rules of the physical layer. This method leverages the redundancy built into certain encoding schemes to create distinct markers for frame delimitation. How It Works This technique is specifically used in networks where the physical medium encoding contains redundancy, such as in Manchester encoding. In Manchester coding, each data bit is represented by two physical bits, creating natural redundancy that can be exploited for framing purposes. Manchester Encoding and Coding ... Read More

Advertisements