Moumita has Published 162 Articles

Datagram Network

Moumita

Moumita

Updated on 28-Nov-2020 08:16:32

20K+ Views

In a connectionless communication systems, datagram refers to the smallest unit via which data is transmitted. Datagrams are data packets which contain adequate header information so that they can be individually routed by all intermediate network switching devices to the destination. These networks are called datagram networks since communication occurs ... Read More

Routing within a datagram network

Moumita

Moumita

Updated on 28-Nov-2020 08:15:34

1K+ Views

In packet switching networks using datagrams, datagrams are data packets which contain adequate header information so that they can be individually routed by all intermediate switching devices to the destination. These networks are called datagram networks since communication occurs via datagrams.Routing PrincipleIn datagram networks, each data packet is routed independently ... Read More

Store – and – Forward Packet Switching

Moumita

Moumita

Updated on 28-Nov-2020 08:14:15

12K+ Views

In telecommunications, store − and − forward packet switching is a technique where the data packets are stored in each intermediate node, before they are forwarded to the next node. The intermediate node checks whether the packet is error−free before transmitting, thus ensuring integrity of the data packets. In general, ... Read More

Network Layer Design Issues

Moumita

Moumita

Updated on 28-Nov-2020 08:12:16

31K+ Views

The network layer or layer 3 of the OSI (Open Systems Interconnection) model is concerned delivery of data packets from the source to the destination across multiple hops or links. It is the lowest layer that is concerned with end − to − end transmission. The designers who are concerned ... Read More

Functions of the Network Layer

Moumita

Moumita

Updated on 28-Nov-2020 08:11:25

18K+ Views

The main function of the network layer or layer 3 of the OSI (Open Systems Interconnection) model is delivery of data packets from the source to the destination across multiple hops or links. It also controls the operation of the subnet.The functions are elaborated as below −When data is to ... Read More

The Computer Network Layer

Moumita

Moumita

Updated on 28-Nov-2020 08:11:02

602 Views

The network layer or Layer 3 of the OSI (Open Systems Interconnection) model is responsible for the source to destination delivery of data packets across multiple hops or nodes. It controls the operation of the subnet.The position of the network layer in the OSI model is depicted in the following ... Read More

Slotted ALOHA

Moumita

Moumita

Updated on 23-Sep-2020 09:07:16

16K+ Views

ALOHA is a medium access control (MAC) protocol for transmission of data via ashared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel. There are two types of ALOHA protocols – Pure ALOHA and Slotted ALOHA.Slotted ALOHA was introduced in ... Read More

Pure ALOHA

Moumita

Moumita

Updated on 23-Sep-2020 08:54:13

18K+ Views

ALOHA is a medium access control (MAC) protocol for transmission of data via a shared network channel. Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel. There are two types of ALOHA protocols – Pure ALOHA and Slotted ALOHA.In pure ALOHA, the ... Read More

What is Carrier Sense Multiple Access (CSMA)?

Moumita

Moumita

Updated on 21-Sep-2020 14:50:20

18K+ Views

Carrier Sense Multiple Access (CSMA) is a network protocol for carriertransmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and transmits if the channel is not busy. Using CMSA protocols, more than one users or ... Read More

Radio Frequency IDentification (RFID)

Moumita

Moumita

Updated on 11-Sep-2020 11:10:47

3K+ Views

Radio Frequency Identification (RFID) is the application of radio waves to read and capture information stored on tags affixed to objects. RFID readers are installed at tracking points and can read information from tags when they come into range, which can be of several feet radius. A tag need not ... Read More

Advertisements