Found 1301 Articles for MCA

What are the Routing Algorithms in Computer Network?

Ginni
Updated on 05-May-2021 10:31:45

2K+ Views

The services of the network layer are routing the packets from source to destination devices. It can do this in a single pass or many passes. The algorithm which selects the routes and data structures that they facilitate is known as the routing algorithm. This is a significant field of network layer design. They are that element of network layer application responsible for transmitting the output channel for an incoming packet.In the case of datagrams, the decisions create new for each appearing data packet, and in the case of the virtual circuit, they are made only once, i.e., when a ... Read More

Explain the services provided by Network Layer in Computer Network.

Ginni
Updated on 05-May-2021 10:30:00

2K+ Views

This layer is the third layer of the OSI model, and it is the lowest layer that manages end to end transmission and provides services to the transport layer. The network layer’s primary role is to route the messages associated with the higher protocol layer above it and across the network (the network which links the distributed DTEs systems).The Network Layer can operate both in a connectionless-mode as well as in a connectionoriented mode. In LANs, the frame is addressed and routed between nodes attached to the same LAN using their point of attachment address.The network layer is also known ... Read More

What are Data Link Protocols in Computer Network?

Ginni
Updated on 05-May-2021 10:29:06

1K+ Views

Protocols define a collection of rules or conventions for executing a definite function. It is a collection of the requirements that can manage the data link layer. The fundamental goals of computer broadcasting in a system environment are to transmit a limitless huge message from the source hub to the destination hub.The major service of the Data Link Layer is to send the datagram across a single connection. In Data Link Layer, the datagram can be managed by various link layer protocols on multiple connections in a path. For example, the datagram is managed by Ethernet on the primary link, ... Read More

Differentiate between Synchronous TDM and Asynchronous TDM in Computer Network

Ginni
Updated on 05-May-2021 10:26:43

6K+ Views

Synchronous TDMSynchronous TDM is primarily known as synchronous because each time slot is preauthorized to a continuing source. Synchronous TDM is a data transfer approach during which there may be a continuous flow of data signals followed by timing signals. It helps to support that the send and therefore the receiver are synchronized with one another.The time slots are broadcasted regardless of whether the sources have any information to transmit or not. Thus, for the benefit of the integrity of execution, the channel space is wasted.Asynchronous TDMAsynchronous TDM is called statistical division multiplexing. It is a method in which time ... Read More

Differentiate between Datagram Approach and Virtual Circuit in Computer Network.

Ginni
Updated on 05-May-2021 10:24:11

4K+ Views

Datagram ApproachA packet-switching technology in which a packet exists is called a datagram. It is treated as a separate entity. Each packet includes data about the destination, and the switch helps this data forward the packet to the right destination. It is also known as connectionless switching.Virtual CircuitVirtual Circuit is also referred to as connection-oriented switching. A fixed, consistent direction through the transmitter’s network is settled in the virtual circuit method earlier any packets are transmitted. This direction remains constant for the session period.DifferencesThe major differences between the datagram approach and virtual circuit are as follows −Datagram ApproachVirtual CircuitThere is ... Read More

What are the services of Network Security in Computer Network?

Ginni
Updated on 05-May-2021 10:22:58

11K+ Views

Computer network security consists of measures taken by a business or some organizations to monitor and prevent unauthorised access from the outside attackers.Different approaches to computer network security management have different requirements depending on the size of the computer network.For example, a home office requires basic network security, while large businesses require high maintenance to prevent the network from malicious attacks.Network Security ServicesThere are various services of network security which are as follows −Message ConfidentialityMessage confidentiality or privacy means that the sender and the receiver expect confidentiality. The transmitted message must make sense to only the intended receiver. To all ... Read More

Explain the ISDN services and its structure.

Ginni
Updated on 04-May-2021 14:07:17

295 Views

There are two essential Integrated Services Digital Network (ISDN) services offered in computer network, which are as follows −Basic Rate Interface (BRI)It consists of 2B + D channels which stand for 2 Bearer medium of 64 kbps each for data and one D channel of 16 Kbps for handshaking and control. It can have a separate track for handshaking and control is known as 'out of band' signaling.Primary Rate Interface (PRI)It consists of 23B + D channels that stand for 23 Bearer medium of 64 kbps each for data and one D medium of 64 Kbps for handshaking control. The ... Read More

What is ISDN in the Computer Network?

Ginni
Updated on 04-May-2021 14:04:04

9K+ Views

ISDN stands for Integrated Services Digital Network. It is used to bridge the Central Office's local loop and the premise connection (home). ISDN uses the existing wiring so that no new cabling is required. It is a digital service that restores the analog plain old telephone set.An Integrated Digital Network (ISDN) is a network in which digital switching connections are used to transmit digital signals. Integrated Services refers to ISDNs ability to deliver two simultaneous connections, in any merging of data, voice, video and fax, over an individual line. Multiple devices can be connected to the line and sent as ... Read More

What is an ARC NET in the Computer Network?

Ginni
Updated on 04-May-2021 15:31:07

3K+ Views

ARC NET stands for Attached Resources Computing Network. It is the central LAN topology in which coaxial cables are used. It is very similar to a thin net (thin Ethernet) in appearance, but the cable used in it is 93 ohm RG-62 A/U cable which is not interchangeable with the thin net cable.ARC NET is a topology that uses a token passing method. It is an old token-based topology that is rarely used nowadays. ARC NET was developed before the token ring networks, and initially, it used the bus topology to connect the workstations.The network operates at 2.5 Mbps and ... Read More

What are the RF (Radio Frequency) Networks?

Ginni
Updated on 04-May-2021 14:00:32

1K+ Views

RF can travel through air or space but require specific transmitting and receiving mechanisms. It has frequencies between 10 kHz to 14 kHz. In VLF (very low frequency), LF (Low Frequency), and MF (Medium Frequency) bands, radio waves follow ground waves.AM radio broadcasting uses the MF band. Radio waves in these bands pass through the building quickly. HF (High Frequency) and VHF (Very High Frequency) tend to be absorbed by the earth, but these waves travel through the Ionosphere. These waves are refracted by it and sent back to earth. The military communicates in HF and VHF bands.AdvantagesIt is easy ... Read More

Advertisements