• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Multiple Access

What is the difference between TCP/IP and OSI model?

By Dinesh Thakur

The TCP / IP layer set corresponds to the OSI reference model levels as follows: [Read more…] about What is the difference between TCP/IP and OSI model?

What is MIMO (Multiple Input Multiple Output)?

By Dinesh Thakur

MIMO technology (Multiple Input Multiple Output) is not new, but it hits the market that at the end of the first decade of the 2000s due to a very complex implementation. MIMO aims to carry multiple streams in parallel on different antennas but using the same frequency. [Read more…] about What is MIMO (Multiple Input Multiple Output)?

Random Access Methods in Computer Networks

By Dinesh Thakur

Random Access, which is to issue a completely random time, relies on the Aloha method. The latter takes its name from an experiment performed on a network connecting the various islands of the Hawaiian Archipelago early 1970. In this method, when a coupler has information to transmit, it sends it without worry about other users. If there is a collision, that is to say superposition of two signals or more users, the signals become indecipherable and are lost. They are subsequently transmitted, as shown in Figure, in which the couplers 1, 2 and 3 collide. The coupler 1 transmits its field first because he shot the smallest timer. Then, the module 2 emits, and its signals collide with the coupler 1. Both derive a random time of retransmission. The coupler 3 is listening while the couplers 1 and 2 are silent, so that the frame of the coupler 3 passes successfully. Technical aloha is the origin of all the random access methods. [Read more…] about Random Access Methods in Computer Networks

What is OTN (Optical Transport Network) ?

By Dinesh Thakur

SONET/SDH standard was carry telephone speech, and it took many adaptations for the transport of frames and type of IP packets, ATM, or others. The successor of SONET/SDH has been launched in early 2002 and standardized by ITU-T as the OTN (Optical Transport Network). Its role is to channel packages on routes to 2,5, 10 and 40 Gbit/s. The corresponding recommendation G.709 carries the number. [Read more…] about What is OTN (Optical Transport Network) ?

What is Synchronous Digital Hierarchy (SDH)?

By Dinesh Thakur

SDH recommendation was standardized by ITU-T (G.707 and G.708): [Read more…] about What is Synchronous Digital Hierarchy (SDH)?

What is Plesiochronous media?

By Dinesh Thakur

To achieve simultaneous multiplexing multiple telephone lyrics on the same circuit, Americans have adopted a standard for multiplexing 24 channels of 64 kbit/s on a support at 1544 Kbit / s. This channel is called DS-1. Europeans have responded to this technique by the E-1 channel multiplexing 30 voice channels on a support 2048 Mbit/s. From this basic multiplexing, a hierarchy has been defined, it is a multiple of the base channel, as in the case of Europe, or a little more complex, as in the US case, because an area of supervision rate-dependent. [Read more…] about What is Plesiochronous media?

TCP/IP Architecture

By Dinesh Thakur

In the 1970s, the Department of Defense, or DOD (Department Of Defense), decided before the proliferation of machines using different, incompatible communication protocols, to define its own architecture. This architecture, called TCP / IP, is the source of the Internet. It is also adopted by many private networks, called intranets. [Read more…] about TCP/IP Architecture

What is CRC?

By Dinesh Thakur

CRC (cyclical redundancy checking) is a rather sophisticated error checking routine used to assure that two communicating computers are really getting the correct data. There are a whole bunch of these error correction and checking methods out there, but they all have pretty much the same objective: making sure that no data is lost or misinterpreted when two computers are exchanging information over the phone lines (through a modem, of course).

Data Encapsulation

By Dinesh Thakur

Data encapsulation simply means adding the IP header to the data. The IP header consists of five or six 32-bit words; the sixth word is attributed to the IP options field. [Read more…] about Data Encapsulation

What is Transmission Control Protocol/Internet Protocol (TCP/IP)?

By Dinesh Thakur

In 1969, the Advanced Research Projects Agency (ARPA), belonging to the United States Department of Defense, funded a project. ARPA established a network of switching packets of computers connected through rented point-to-point lines called the Network of the Agency for Advanced Research Projects (ARPANET), which provided the basis for the first investigations in network interconnection. The conventions developed by ARPA to specify how individual computers could communicate over the network became TCP / IP. [Read more…] about What is Transmission Control Protocol/Internet Protocol (TCP/IP)?

Code Division Multiplexing (CDM)/Spread Spectrum

By Dinesh Thakur

CDM is widely used in so-called second-generation (2G) and third-generation 3G wireless communications. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands. This is a combination of analog-to-digital conversion and spread spectrum technology. [Read more…] about Code Division Multiplexing (CDM)/Spread Spectrum

Statistical Time Division Multiplexing (STDM)

By Dinesh Thakur

In case of TDM, time slots are allocated to channels, even if they have no information to transmit. This is just wastage of the bandwidth and to overcome this inefficiency of standard TDM, a technique known as STDM has been developed where time is allocated to lines only when it is required. This is achieved with the use of intelligent devices that are capable of identifying when a terminal is idle. [Read more…] about Statistical Time Division Multiplexing (STDM)

Frequency Division Multiplexing

By Dinesh Thakur

In Frequency Division Multiplexing (FDM), multiple channels are combined onto a single aggregate signal for transmission. The channels are separated in the aggregate by their frequency. It is explained in the Figure where a frequency dimension is subdivided into several non-overlapping frequency bands. Each channel ci is allotted its own frequency band as depicted in Figure. [Read more…] about Frequency Division Multiplexing

Code Division Multiple Access (CDMA).

By Dinesh Thakur

CDMA (Code Division Multiple Access) also called spread-spectrum and code division multiplexing, one of the competing transmission technologies for digital MOBILE PHONES. The transmitter mixes the packets constituting a message into the digital signal stream in an order determined by a PSEUDO-RANDOM NUMBER sequence that is also known to the intended receiver, which uses. it to extract those parts of the signal intended for itself. Hence each different random sequence corresponds to a separate communication channel. CDMA is most used in the USA. [Read more…] about Code Division Multiple Access (CDMA).

Time Division Multiple Access (TDMA).

By Dinesh Thakur

• In TDMA, the bandwidth of channel is dividend amongst various stations on the basis of time. [Read more…] about Time Division Multiple Access (TDMA).

Frequency Division Multiple Access (FDMA).

By Dinesh Thakur

• In FDMA, the available bandwidth is divided into various frequency bands. [Read more…] about Frequency Division Multiple Access (FDMA).

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

By Dinesh Thakur

• CSMA/CA protocol is used in wireless networks because they cannot detect the collision so the only solution is collision avoidance.

• CSMA/CA avoids the collisions using three basic techniques. [Read more…] about Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

By Dinesh Thakur

To reduce the impact of collisions on the network performance, Ethernet uses an algorithm called CSMA with Collision Detection (CSMA / CD): CSMA/CD is a protocol in which the station senses the carrier or channel before transmitting frame just as in persistent and non-persistent CSMA. If the channel is busy, the station waits. it listens at the same time on communication media to ensure that there is no collision with a packet sent by another station. In a collision, the issuer immediately cancel the sending of the package. This allows to limit the duration of collisions: we do not waste time to send a packet complete if it detects a collision. After a collision, the transmitter waits again silence and again, he continued his hold for a random number; but this time the random number is nearly double the previous one: it is this called back-off (that is to say, the “decline”) exponential. In fact, the window collision is simply doubled (unless it has already reached a maximum). From a packet is transmitted successfully, the window will return to its original size. [Read more…] about Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

How many amplitude levels are there for each of the following methods

By Dinesh Thakur

NRZ-L (No return to zero level): this kind of encoding uses negative voltage to represent a binary 1 and positive voltage to represent a binary 0. As shown under: non return to zero is related with the voltage i.e. voltage never returns to a value of zero and the value of the voltage during a bit time is known as level. bit time is related with the amount of time one bit of data occupies. [Read more…] about How many amplitude levels are there for each of the following methods

Multiplexing – What is Multiplexing ?Explain its Multiplexing Methods

By Dinesh Thakur

Multiplexing or (muxing) – To combine multiple signals (analog or digital) for transmission over a single line or media. A common type of multiplexing combines several low-speed signals for transmission over a single high-speed connection. In other words, we can say that Muxing used for sharing of a medium and its link by two or more devices. It can provide both Efficiency and Privacy.
[Read more…] about Multiplexing – What is Multiplexing ?Explain its Multiplexing Methods

What is wired transmission? Type of wired transmission

By Dinesh Thakur

Telephone line or telephone circuit (or just line or circuit within the industry) is a single-user circuit on a telephone communication system. Typically this refers to the physical wire or other signaling medium connecting the user’s telephone apparatus to the telecommunications network, and usually also implies a single telephone number for billing purposes reserved for that user. [Read more…] about What is wired transmission? Type of wired transmission

TCP/IP Reference Model

By Dinesh Thakur

Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is the engine for the Internet and networks worldwide. Its simplicity and power has led to its becoming the single network protocol of choice in the world today. TCP/IP is a set of protocols developed to allow cooperating computers to share resources across the network. 
[Read more…] about TCP/IP Reference Model

Carrier Sense Multiple Access (CSMA)

By Dinesh Thakur

Carrier Sensed Multiple Access (CSMA) : CSMA is a network access method used on shared network topologies such as Ethernet to control access to the network. Devices attached to the network cable listen (carrier sense) before transmitting. If the channel is in use, devices wait before transmitting. MA (Multiple Access) indicates that many devices can connect to and share the same network. All devices have equal access to use the network when it is clear. [Read more…] about Carrier Sense Multiple Access (CSMA)

Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW