Found 1625 Articles for Computer Network

What is three-bit sliding window protocol?

Bhanu Priya
Updated on 11-Sep-2021 07:28:25

884 Views

Sliding window protocol is a transmission control protocol. To hold the outgoing and incoming packets both the sender and receiver maintains a finite buffer. Every packet sent from the sender side must be acknowledged by the receiver.The sender is maintaining a timer for every packet sent, and any unacknowledged packet in a certain time is resent. The sender will send a complete window of packets before receiving an acknowledgement for the first packet in the window. This leads to a higher transfer rate, as the sender may send multiple packets without waiting for each packet's acknowledgement.The Receiver advertises a window ... Read More

What are transmission and propagation delay?

Bhanu Priya
Updated on 11-Sep-2021 07:12:45

6K+ Views

Network delay is defined as how much time will take a bit of data to travel from one node to another node.Network delay can be divided into following ways −Transmission delayPropagation delayLet us learn about both of them in detail.Transmission delayIt is the time required to put a packet’s bit (or data bits) on the transmission medium that can be wired or wireless. Transmission delay depends on the length of the packet and bandwidth of the network.Transmission delay can be calculated as follows −Transmission delay = Packet size / bandwidth          packet           ... Read More

What is Traffic Throttling in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 07:09:56

5K+ Views

Traffic throttling is one of the approaches for congestion control. In the internet and other computer networks, senders trying to adjust the transmission need to send as much traffic as the network can readily deliver. In this setting the network aim is to operate just before the onset of congestion.There are some approaches to throttling traffic that can be used in both datagram and virtual-circuit networks.Each approach has to solve two problems −FirsRouters have to determine when congestion is approaching ideally before it has arrived. Each router can continuously monitor the resources it is using.There are three possibilities, which are ... Read More

What is an admission control approach for congestion control?

Bhanu Priya
Updated on 11-Sep-2021 07:04:37

6K+ Views

The presence of congestion means the load is greater than the resources available over a network to handle. Generally, we will get an idea to reduce the congestion by trying to increase the resources or decrease the load, but it is not that much of a good idea.There are some approaches for congestion control over a network which are usually applied on different time scales to either prevent congestion or react to it once it has occurred.Admission ControlIt is one of techniques that is widely used in virtual-circuit networks to keep congestion at bay. The idea is do not set ... Read More

What is traffic aware routing in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 07:02:54

3K+ Views

Traffic awareness is one of the approaches for congestion control over the network. The basic way to avoid congestion is to build a network that is well matched to the traffic that it carries. If more traffic is directed but a low-bandwidth link is available, congestion occurs.The main goal of traffic aware routing is to identify the best routes by considering the load, set the link weight to be a function of fixed link bandwidth and propagation delay and the variable measured load or average queuing delay.Least-weight paths will then favour paths that are more lightly loaded, remaining all are ... Read More

How to do Fuzzy Matching on Pandas Dataframe Column Using Python?

AmitDiwan
Updated on 09-Sep-2021 10:32:35

2K+ Views

We will match words in the first DataFrame with words in the second DataFrame. For closest matches, we will use threshold. We took the value of threshold as 70 i.e., match occurs when the strings at more than 70% close to each other.Let us first create Dictionaries and convert to pandas dataframe −# dictionaries d1 = {'Car': ["BMW", "Audi", "Lexus", "Mercedes", "Rolls"]} d2 = {'Car': ["BM", "Audi", "Le", "MERCEDES", "Rolls Royce"]} # convert dictionaries to pandas dataframes df1 = pd.DataFrame(d1) df2 = pd.DataFrame(d2)Now, convert dataframe column to list of elements for fuzzy matching −myList1 = df1['Car'].tolist() myList2 = ... Read More

What are different approaches to congestion control?

Bhanu Priya
Updated on 09-Sep-2021 08:24:29

10K+ Views

The presence of congestion means the load is greater than the resources available over a network to handle. Generally we will get an idea to reduce the congestion by trying to increase the resources or decrease the load, but it is not that much of a good idea.Approaches to Congestion ControlThere are some approaches for congestion control over a network which are usually applied on different time scales to either prevent congestion or react to it once it has occurred.Let us understand these approaches step wise as mentioned below −Step 1 − The basic way to avoid congestion is to ... Read More

What is Token Bucket algorithm in computer networks?

Bhanu Priya
Updated on 02-Sep-2023 12:29:03

67K+ Views

Token bucket algorithm is one of the techniques for congestion control algorithms. When too many packets are present in the network it causes packet delay and loss of packet which degrades the performance of the system. This situation is called congestion.The network layer and transport layer share the responsibility for handling congestions. One of the most effective ways to control congestion is trying to reduce the load that transport layer is placing on the network. To maintain this network and transport layers have to work together.The Token Bucket Algorithm is diagrammatically represented as follows −With too much traffic, performance drops ... Read More

What are services provided to transport layer by network layer?

Bhanu Priya
Updated on 09-Sep-2021 08:19:18

8K+ Views

The network layer is concerned with getting packets from the source all the way to the destination with minimal cost. Unlike the data link layer which has more important goals like just moving frames from one end of a wire to another. The network layer is the lowest layer that deals with end-to-end transmission.Network Layer Design issuesNetwork layer Design issues are as follows −Store and forward packets switchingServices provided to the transport layerImplementation of connectionless servicesImplementation of connection oriented servicesComparison of virtual-circuit datagram networksNow let us see one of the design issues of the network layer.Services provided to the transport ... Read More

What is physical layer coding violation?

Bhanu Priya
Updated on 09-Sep-2021 08:15:36

3K+ Views

Data link layer translates the physical layers raw bit stream into discrete messages called frames. Now the question is how can a frame be transmitted, so the receiver can recognize the start and end frame?TechniquesThe techniques we used to find the start and end frame are −Character countFlag byte with byte stuffingStarting and ending flag with bit stuffingEncoding Violation.Now let us see the Physical layer encoding violation technique.Physical layer encoding violationThis framing method is used only in those networks in which encoding on the physical medium contain some redundancy.Some LANs encode each bit of data by using two physical bits ... Read More

Advertisements