Found 1301 Articles for MCA

What is Half Duplex mode? Differentiate between half duplex and full duplex?

Bhanu Priya
Updated on 15-Sep-2021 09:14:57

3K+ Views

When a data is transmitted from one device to another device is known as transmission mode, it is also known as the communication mode.Generally, the communication channel is a direction associated, and transmission media role is to provide the direction. So, we call transmission mode a directional mode.The transmission mode is work in the physical layer.Types of Transmission modeThe Transmission mode is divided into three categories, which are as follows −Simplex ModeHalf-duplex ModeFull-duplex mode (Duplex Mode)The types of transmission mode are shown in the chart below −Let us see the half duplex mode of transmission.Half duplex modeIn a Half-duplex channel, ... Read More

What is simplex mode of transmission in computer networks?

Bhanu Priya
Updated on 15-Sep-2021 09:12:21

2K+ Views

When a data is transmitted from one device to another device is known as transmission mode, it is also known as the communication mode.Generally, the communication channel is a direction associated, and transmission media role is to provide the direction. So, we call transmission mode a directional mode.The transmission mode is work in the physical layer.Types of Transmission modeThe Transmission mode is divided into three categories, which are as follows −Simplex ModeHalf-duplex ModeFull-duplex mode (Duplex Mode)The types of transmission mode are shown in the chart below −Let us see the simplex mode of transmission.Simplex modeIn Simplex mode, the communication is ... Read More

What are wireless sensor networks?

Bhanu Priya
Updated on 15-Sep-2021 09:10:19

8K+ Views

Wireless sensor networks (WSNs) have the power of distributed communication, computing, and sensing features. They are characterized as infrastructure less, fault tolerant and self-organizing networks which provide opportunities for low-cost, easy-to-apply, rapid and flexible installations in an environment for various applicationsThe wireless sensor and the sensor node architecture are given in the diagram below −Characteristics of WSNThe characteristics of WSN are as follows −Resource constraints − Nodes of WSN are smaller in size and get power from the batteries. It justifies that service provided by the nodes like communication and computation amount of memory is very limited.Communication paradigm − The ... Read More

What is client/server network and types of servers?

Bhanu Priya
Updated on 15-Sep-2021 09:03:49

16K+ Views

Local Area networks are of two types − Peer to Peer network and client server network.Let us discuss about client server network −Client/Server NetworkIn client-server network relationships, certain computers act as servers and others act as clients.A server is simply a computer that provides the network resources and provides service to other computers when they request it. A client is the computer running a program that requests the service from a server. Local area network (LAN) is based on client server network relationship.A client-server network is one on which all available network resources such as files, directories, applications and shared ... Read More

What is the process of securing the network architecture using TSL, SSL, and Cryptography?

Bhanu Priya
Updated on 15-Sep-2021 09:00:29

263 Views

TLS (Transport layer security) is the successor or the updated version of SSL and the basic process of securing the network by both is more or less the same.Transport Layer Security (TLS)/Secure Sockets Layer (SSL) are computer networking protocols for securing connections between network application clients and servers over an insecure network. These protocols provide a mechanism for encrypting and authenticating data sent between client and server.SSL/TLS layers are responsible for the transport of data between processes and the routing of network traffic over a network between client and server, and below application layer protocols such as Hypertext Transfer Protocol ... Read More

What are Logical Link Control (LLC) and Medium Access Control(MAC)?

Bhanu Priya
Updated on 15-Sep-2021 08:58:03

15K+ Views

Logic Link Control (LLC) Layer and Medium Access Control (MAC) layers are the sublayers of the Data link layer in the OSI reference model.OSI reference model: It stands as Open Systems Interconnection. OSI is a 7 layer architecture which contains 7 layers. Each layer has its own specific functionality. All these 7 layers in the OSI model are used to transmit data.Data Link LayerIn computer networking, the data link layer is the 2nd layer of the OSI reference model. The main function of this layer is to transmit data between nodes. The data link layer transmits data between network entities ... Read More

What is a modem? What are different types of modem?

Bhanu Priya
Updated on 07-Nov-2023 12:43:58

35K+ Views

Modem stands for Modulator and Demodulator. It is a device that modulates signals to encode digital information for transmission and demodulates signals to decode the transmitted information.A modem transmits data in bits per second (bps).It is necessary for communication between digital devices and Analog devices.Modem is necessary because it acts as a translator between the devices and rapidly transmits the information.It converts the digital signal to Analog and vice versa to communicate between devices.It encodes the signal and decodes at the other end and vice versa between the devices.Building blocks of modem are shown in the diagram below −Types of ... Read More

What are the most used network troubleshooting tools?

Bhanu Priya
Updated on 15-Sep-2021 08:52:57

378 Views

The network troubleshooting tools are useful for every network administrator. These tools can be used to troubleshoot different network conditions.The network troubleshooting tools which are most used are as follows −RouteThe route utility is helpful to display the status of the routing table on host. The route utility is limited at the situations where the host has one ip address with one gateway. The route plays a key role at multiple IP addresses and multiple gateways.pathping / mtrThe pathping and meter utilities take the information obtained from tools and provide a more detailed picture of the characteristic path from particular ... Read More

How does the IPsec use digital certificates and digital signatures?

Bhanu Priya
Updated on 15-Sep-2021 08:52:03

846 Views

IPSec is one of the secure techniques on the market for connecting network sites.IPSec was designed to supply the subsequent safety features once transferring packets across networks the following factors −Authentication − Verifies that the packet received is truly from the claimed sender.Integrity − Ensures that the contents of the packet didn't amend in transit.Confidentiality − Conceals the message content through secret writing.Use of Digital CertificateIt is explained below how IP security (IPsec) makes use of Digital Certificate.A digital certificate is an associate electronic document issued by a Certificate Authority (CA). It contains the general public key for a digital ... Read More

What is SD-WAN and its working condition?

Bhanu Priya
Updated on 15-Sep-2021 08:50:40

316 Views

Mostly in the digital age, an enterprise Software-defined Wide Area Network (SD-WAN) can modernise your network and propel your business, while a single centralised SD-WAN can unify network connectivity and allow application delivery to be coordinated across an entire network.A WAN is a link separated by a significant distance between local area networks (LANs), anything from a few miles to thousands of miles. The word software-defined means the WAN is designed and managed programmatically. Therefore, it can be easily modified to meet evolving needs rapidly.Given below is the diagram of SD-WAN −Features of SD-WANThere are some features commonly attributed to ... Read More

Advertisements