Found 1625 Articles for Computer Network

General Data Link Layer Frame Structure

George John
Updated on 30-Jul-2019 22:30:24

1K+ Views

Framing in Data Link LayerIn the physical layer, data transmission involves synchronised transmission of bits from the source to the destination. The data link layer packs these bits into frames. Data-link layer takes the packets from the Network Layer and encapsulates them into frames. If the frame size becomes too large, then the packet may be divided into small sized frames. At receiver’ end, data link layer picks up signals from hardware and assembles them into frames.General Structure of a FrameA frame has the following parts:Frame Header: It contains the source and the destination addresses of the frame and the ... Read More

What are the headers used in a Data Link Layer?

Chandu yadav
Updated on 30-Jul-2019 22:30:24

1K+ Views

Data Link Layer FrameA frame is a unit of communication in the data link layer. Data link layer takes the packets from the Network Layer and encapsulates them into frames. If the frame size becomes too large, then the packet may be divided into small sized frames. At receiver’ end, data link layer picks up signals from hardware and reassembles them into frames.Frame Structure and Frame HeaderA frame is composed of four types of fields, namely kind, seq, 𝑎𝑐𝑘 and info. The first three fields contain control information about the frame and collectively form the frame header. Besides, the frame ... Read More

What is Network Acceleration?

Arjun Thakur
Updated on 30-Jul-2019 22:30:24

2K+ Views

Network acceleration is a set of techniques used to increase the speed of information flow between the end users for imparting better network experience. It is also known as WAN optimization or WAN acceleration.Techniques involved in Network AccelerationTraffic Shaping: Priority is assigned to network traffic on whose basis bandwidth is allocated.Data Deduplication and Data Caching: Duplicate data is cached and references of them are sent for additional requests of the same data. This reduces the data volume for remote backups, replication, and disaster recovery.Compression: The size of data is reduced to lower bandwidth usage.Choice of Protocols: High performance protocols are ... Read More

What is WAN accelerator?

Ankith Reddy
Updated on 30-Jul-2019 22:30:24

461 Views

A wide area network accelerator (WAN accelerator) is a hardware component, a software, or an appliance executing in a virtualized environment that provides caching and optimization of WAN services. A WAN accelerator is also called a WAN optimizer or application accelerator.Working PrincipleA WAN accelerator provides services to speed up information flow between the end users for imparting better network experience. Its target is to reduce the data volume to be transmitted. So, it compresses data and uses data deduplication techniques. The accelerator caches duplicate data and sends references of them when they are needed multiple times instead of resending the ... Read More

What is network interface card (NIC)?

George John
Updated on 31-Oct-2023 13:34:36

64K+ Views

A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also called network interface controller, network adapter, or LAN adapter.PurposeNIC allows both wired and wireless communications.NIC allows communications between computers connected via local area network (LAN) as well as communications over large-scale network through Internet Protocol (IP).NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware circuitry so that the physical layer processes ... Read More

Elementary Data Link Protocols

Chandu yadav
Updated on 13-Sep-2023 15:56:09

42K+ Views

Protocols in the data link layer are designed so that this layer can perform its basic functions: framing, error control and flow control. Framing is the process of dividing bit - streams from physical layer into data frames whose size ranges from a few hundred to a few thousand bytes. Error control mechanisms deals with transmission errors and retransmission of corrupted and lost frames. Flow control regulates speed of delivery and so that a fast sender does not drown a slow receiver.Types of Data Link ProtocolsData link protocols can be broadly divided into two categories, depending on whether the transmission ... Read More

What is algorithm for computing the CRC?

Ankith Reddy
Updated on 30-Jul-2019 22:30:24

6K+ Views

Cyclic Redundancy Check (CRC)Cyclic Redundancy Check (CRC) is a block code that was invented by W. Wesley Peterson in 1961. It is commonly used to detect accidental changes to data transmitted via telecommunications networks and storage devices.CRC involves binary division of the data bits being sent by a predetermined divisor agreed upon by the communicating system. The divisor is generated using polynomials. So, CRC is also called polynomial code checksum.Before sending the message over network channels, the sender encodes the message using CRC. The receiver decodes the incoming message to detect error. If the message is error-free, then it is ... Read More

What is Polynomial Code?

George John
Updated on 30-Jul-2019 22:30:24

3K+ Views

A polynomial code is a linear code having a set of valid code words that comprises of polynomials divisible by a shorter fixed polynomial is known as generator polynomial.They are used for error detection and correction during the transmission of data as well as storage of data.Types of Polynomial CodesThe types of polynomial codes are:Cyclic Redundancy CodeBose–Chaudhuri–Hocquenghem (BCH) CodesReed–Solomon CodesRepresentation of Bit Strings with PolynomialsThe code words, which are essentially bit strings, are represented by polynomials whose coefficients are either 0 or 1. A 𝑘 – bit word is represented by a polynomial ranging from 𝑥0 to 𝑥𝑘−1. The order ... Read More

Fletcher’s Checksum

Chandu yadav
Updated on 30-Jun-2020 07:38:08

3K+ Views

Fletcher checksum is an error – detection technique that uses two checksums to determine single-bit errors in a message transmitted over network channels. It is a block code technique that was devised by John G. Fletcher in 1970s at Lawrence Livermore Labs, USA.The checksums are created based on the data values in the data blocks to be transmitted and appended to the data. When the receiver gets this data, the checksums are re-calculated and compared with the existing checksums. A non-match indicates an error.The error-detection capabilities of this method is nearly same as that of Cyclic Redundancy Check (CRC) but ... Read More

What is meant cyber crime? What are its different types?

Knowledge base
Updated on 30-Jul-2019 22:30:24

416 Views

Cybercrime is the crime that is done using the internet and a computer or a phone or any other device as an instrument to cheat people, commit frauds, stealing intellectual property, violating privacy, stealing identities and diverting monetary transactions through the internet, female and child trafficking in pornography etc. Cybercrime has been very prevalent in the world today that almost everyone in the world is directly or indirectly affected by this. As the computer has become the gateway to the trade, banking, governance etc. Cybercrime is increasing by leaps and bounds.There are different types of Cybercrime that can be enlisted ... Read More

Advertisements