Found 1301 Articles for MCA

Difference between Synthesized and Inherited Attributes

Nitin Sharma
Updated on 09-Jun-2020 08:21:04

16K+ Views

Both Synthesized and Inherited Attribute are the part of semantics of a language that provide meaning to its constructs, like tokens and syntax structure. Semantics help interpret symbols, their types, and their relations with each other and its analysis judges whether the syntax structure constructed in the source program derives any meaning or not. Now on the basis of features of attributes we can distinguish between Synthesized and Inherited AttributesFollowing are the important differences between Synthesized and Inherited Attributes.Sr. No.KeySynthesized AttributeInherited Attribute1DefinitionSynthesized attribute is an attribute whose parse tree node value is determined by the attribute value at child nodes.To ... Read More

Difference between Synchronous and Asynchronous Counter

Kiran Kumar Panigrahi
Updated on 22-Aug-2022 14:20:11

8K+ Views

In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can be grouped into two categories: Synchronous counters and Asynchronous counters.Read through this article to find out how these two types of counters function and how they are different from each other.What is a Synchronous Counter?If the "clock" pulses are applied to all the flip-flops in a counter simultaneously, then such ... Read More

The 802.16 MAC Sublayer Protocol

Moumita
Updated on 27-Apr-2020 07:17:49

2K+ Views

The IEEE 802.16 is a set of standards defining the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access. It lays down the standards for both physical layer as well as medium access control (MAC) layer for WiMAX.The IEEE 802.16 MAC sublayer is a part of the data link layer. The data link layer of WiMAX is divided into three sublayers as follows −Security sublayer − This is the bottommost layer and is concerned with the security and privacy of the wireless ... Read More

The 802.16 MAC Sublayer Frame Structure

Moumita
Updated on 27-Apr-2020 07:15:44

2K+ Views

The IEEE 802.16 set of standards lays down the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access.The IEEE 802.16 MAC sublayer is the most important sublayer and concerned with channel management. It has been designed for connection-oriented channel management for point-to-multipoint (PMP) broadband services.The frame format of a generic MAC frame is shown below −The fields are −EC − A single-bit field indicating whether the payload is encrypted.Type − A 6-bit field identifying frame type.CI − A single-bit field denoting the ... Read More

Difference between Token Bus Network and Token Ring Network

Kiran Kumar Panigrahi
Updated on 04-Aug-2022 08:32:10

3K+ Views

A Token Bus Network is a network protocol used to transmit data. In a Token Bus Network, a virtual ring is formed between nodes/stations and token is transferred from one station to another in a sequential manner. Each node in a Token Bus Network knows the address of its successor and predecessor and can transmit data if it has the token. A Token Ring Network is similar to a Token Bus Network but it works around the physical ring instead of a virtual ring. A token is passed from one node to another in a sequential manner and each node ... Read More

Difference between CSMA/CA and CSMA/CD

Kiran Kumar Panigrahi
Updated on 22-Aug-2022 13:51:02

21K+ Views

Both CSMA/CA and CSMA/CD are network protocols for transmission that operate in the Medium Access Control Layer, however there are significant differences in the way they operate. Read through this article to find out more about CSMA/CA and CSMA/CD and how they are different from each other.What is CSMA/CA?CSMA/CA is a network protocol for carrier transmission that stands for Carrier Sense Multiple Access with Collision Avoidance. It works in the same media access control layer as CSMA/CD. This protocol is effective before the collision.Algorithm of CSMA/CAThe algorithm of CSMA/CA is as follows −When a frame is ready, the transmitting station ... Read More

Difference between Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) cables.

Kiran Kumar Panigrahi
Updated on 04-Aug-2022 08:33:33

2K+ Views

Unshielded Twisted Pair or UTP are twisted pair cables that are used to transmit both data and voice, as their frequency range is suitable for transmission. UTPs are more cost-effective and are not needed to be grounded. Shielded Twisted Pair or STP are also a twisted pair cables but are required to be grounded, wants more maintenance, have high data transmission capacity and are costlier than UTP. Read through this article to find out more about UTP and STP cables and how they are different from each other. What are Shielded Twisted Pair (STP) Cables? IBM invented shielded twisted pair ... Read More

Difference between Ring Topology and Mesh Topology

Kiran Kumar Panigrahi
Updated on 28-Jul-2022 13:09:47

1K+ Views

What is Topology?Network Topology is the way network links and nodes are connected with each other. The physical signal transmission medium is referred to as network topology. On the other hand, "logical network topology" refers to how the data flows through a network among the connected devices, regardless of their physical link.In this article, we will compare and contrast the different features of two network topologies − Ring Topology and Mesh Topology. Read through this article to find out how Ring Topology differs from Mesh Topology.What is Mesh Topology?A mesh network is a sort of local network structure that is ... Read More

NMAP Cheat Sheet

Ajay yadav
Updated on 31-Oct-2023 21:24:08

70K+ Views

Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ... Read More

Frame Structure for OFDMA with Time Division Duplexing

Moumita
Updated on 04-Feb-2020 10:23:44

511 Views

Orthogonal frequency division multiple access (OFDMA) is a multi-user version of digital data modulation scheme OFDM (orthogonal frequency division multiplexing). In OFDM, a single stream of data is divided into several separate sub-streams for transmission via multiple channels. OFDM uses the principle of frequency division multiplexing (FDM), where the available bandwidth is divided into a set of sub-streams having separate frequency bands.In OFDMA, multiple access is achieved by assignment of different subsets of subcarriers to individual stations. This permits transmission to go on simultaneously at lower data rate from several stations.The stations assigned to a given subcarrier alternate between sending ... Read More

Advertisements