Found 1301 Articles for MCA

Differentiate between infrastructure mode and the ad hoc mode of IEEE 802.11

Bhanu Priya
Updated on 11-Sep-2021 14:27:49

16K+ Views

802.11 architecture uses two types of modes, which are as follows −Infrastructure ModeThe most popular mode used to connect clients like laptops and smartphones to another network such as company intranet or internet.This mode is shown below −In infrastructure mode every client is associated with an Access point which is in turn connected to another network. The client sends and receives its packet via Access Point.Ad-Hoc ModeCollections of computers are associated so that they can directly send frames to each other. There is no Access Point in Ad hoc, because Internet access is the killer application for wireless. Ad hoc ... Read More

What is the performance of ethernet and token ring under light traffic load?

Bhanu Priya
Updated on 11-Sep-2021 14:26:16

388 Views

Ethernet is a way of connecting computers together in LAN, it is the most widely used method of linking computers together in LANs. The basic idea of its design is that multiple computers have access to it and can send data at any time.Token Ring is also a computer networking technology which is used to build local area networks where all stations are connected in a ring topology and pass one or more tokens for channel acquisition.EthernetThe performance of Ethernet under light traffic load is explained below in stepwise manner −Step 1 − Ethernet is a computer networking technology which ... Read More

What is Ethernet evolution in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 14:25:39

3K+ Views

Ethernet was developed at Xerox PARC between 1973 and 1974. Engineer Bob Metcalfe invented it for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed laser printers.It was originally intended to create a network in a small area known as a Local Area Network (LAN).In 1983 the first iteration of Ethernet 10Base 5, was released.In 1985 thin coaxial cable was approved and the group made changes to the specification in 1987, 1990 and 1993.In 1995 so called Fast Ethernet introduced it contains speed and duplex mode (both side transmitting at same time)In 1998 ... Read More

What is binary countdown protocol in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 14:21:52

903 Views

The collision free protocols are of three type and they are as follows −Bit map protocolToken passingBinary countdownNow let see about binary countdown protocol −Binary CountdownThe binary countdown is explained below in stepwise manner −Step 1 − A problem with the bit map protocol and token passing is that overhead is 1 bit per station, so bitmap and token passing will not suit the networks with thousands of stations.Step 2 − A station wants to use the channel. It has to broadcast its address as a binary bit string starting with a high order bit.Step 3 − All addresses are ... Read More

What is Bit Map protocol in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 14:21:20

2K+ Views

Bit map protocol is called collision free Protocol. In bitmap protocol, each contention period consists of exactly N slots. If any station has to send a frame, then it transmits a 1 bit in the respective slot.Bitmap AlgorithmThe algorithm of Bit Map protocol is explained below −Step 1 − We use the bitmap or the bit vector which represents a finite set of distinct integers.Step 2 − To sort the array of integers, initialization of the array size to the specified range is needed and then fill it with zeroes which is a default value in the program followed by ... Read More

What is CSMA with collision avoidance?

Bhanu Priya
Updated on 11-Sep-2021 14:20:43

2K+ Views

Carrier Sense Multiple Access (CSMA) is a random-access protocol (multiple access protocol) that is used to minimise the chance of collision and increase performance. The main principle used is 'sense before transmit'. CSMA is using a shared medium which means any data passed with a common interconnection network.The Carrier Sense Multiple Access (CSMA) Protocol is diagrammatically represented as follows −Suppose the sender places a frame without sensing the status of the channel it will lead a collision with other nodes, if the other node also sends frames to the shared memory. So we sense before transmitting.There are mainly two conditions ... Read More

What is CSMA with collision detection?

Bhanu Priya
Updated on 11-Sep-2021 14:19:48

3K+ Views

Carrier Sense Multiple Access (CSMA) is a random-access protocol (multiple access protocol) that is used to minimise the chance of collision and increase performance. The main principle used is 'sense before transmit'. CSMA is using a shared medium which means any data passed with a common interconnection network.The Carrier Sense Multiple Access (CSMA) Protocol is diagrammatically represented as follows −Suppose the sender places a frame without sensing the status of the channel it will lead a collision with other nodes, if the other node also sends frames to the shared memory. So we sense before transmitting.There are mainly two conditions ... Read More

What is carrier sense multiple access protocols?

Bhanu Priya
Updated on 11-Sep-2021 14:23:12

2K+ Views

Protocols in which stations listen for a carrier and act accordingly are called Carrier Sense Protocols. Multiple Access tells the fact that multiple nodes send and receive on the medium.Transmissions of one node are received by all other nodes using the medium. Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared physical medium, such as an electrical bus, or a band of electromagnetic spectrum.Carrier Sense Multiple Access (CSMA) ProtocolsThe three protocols that discuss the various implementations are as follows −1-persistent CSMANon- ... Read More

What is slotted ALOHA in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 07:43:07

3K+ Views

Aloha is a packet switching system. The time interval required to transmit one packet is called a slot. Aloha is a random access technique.There are two ALOHA protocols as follows −Pure ALOHASlotted ALOHANow let us see what Slotted ALOHA is −Slotted ALOHAThe slotted ALOHA is explained below in stepwise manner −Step 1 − Slotted ALOHA was introduced to improve the efficiency of pure ALOHA, because in pure ALOHA there is a high chance of collision.Step 2 − In this protocol, the time of the shared channel is divided into discrete intervals called as slots.Step 3 − The stations can send ... Read More

What is Pure ALOHA in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 07:43:57

9K+ Views

Aloha is a packet switching system. The time interval required to transmit one packet is called a slot. Aloha is a random access technique.There are two ALOHA protocols as follows −Pure ALOHASlotted ALOHANow let us see what Pure ALOHA is.Pure ALOHAThe mode of random access in which users can transmit at any time is called pure Aloha. This technique is explained below in a stepwise manner.Step 1 − In pure ALOHA, the nodes transmit frames whenever there is data to send.Step 2 − When two or more nodes transmit data simultaneously, then there is a chance of collision and the ... Read More

Advertisements