Found 1112 Articles for Internet

What is Leaky Bucket algorithm in computer networks?

Bhanu Priya
Updated on 07-Sep-2023 01:00:19

46K+ Views

When too many packets are present in the network it causes packet delay and loss of packet which degrades the performance of the system. This situation is called congestion.The network layer and transport layer share the responsibility for handling congestions. One of the most effective ways to control congestion is trying to reduce the load that transport layer is placing on the network. To maintain this, the network and transport layers have to work together.With too much traffic, performance drops sharply.There are two types of Congestion control algorithms, which are as follows −Leaky Bucket AlgorithmToken Bucket AlgorithmLeaky Bucket AlgorithmLet see ... Read More

What do you mean by congestion control algorithm?

Bhanu Priya
Updated on 11-Sep-2021 14:30:11

2K+ Views

When too many packets are present in the network it causes packet delay and loss of packet which degrades the performance of the system. This situation is called congestion.The network layer and transport layer share the responsibility for handling congestions. One of the most effective ways to control congestion is trying to reduce the load that transport layer is placing on the network. To maintain this, network and transport layers have to work together.With too much traffic, performance drops sharply.Types of Congestion Control AlgorithmsThere are two types of Congestion control algorithms, which are explained below −Leaky Bucket AlgorithmIt mainly controls ... Read More

Implementation of connection-oriented services

Bhanu Priya
Updated on 11-Sep-2021 14:29:26

3K+ Views

We need a virtual-circuit subnet for connection-oriented service. Virtual circuits were designed to avoid having to choose a new route for every packet sent.Instead, a route from the source machine to the destination machine is chosen as part of the connection setup and stored in tables inside the routers, when a connection is established. That route is utilised for all traffic flowing over the connection, and exactly the same manner even telephone works.The virtual circuit is also terminated, when the connection is released. In connection-oriented service, every packet will have an identifier which tells to which virtual circuit it belongs ... Read More

What is Implementation of connection less services?

Bhanu Priya
Updated on 11-Sep-2021 14:29:04

4K+ Views

When connectionless service is offered, packets are frequently called Datagrams (just like telegrams) because individual packets are injected to the subnet and are routed individually.No advance setup is required. Subnets are called Datagram subnets. When Connection oriented service is provided, then before any packet is sent a path from source router to destination router is established. This connection is called Virtual Circuit and the subnet is called Virtual Circuit subnet.The implementation of connectionless service is diagrammatically represented as follows −Datagram NetworkLet us discuss how datagram network works in stepwise manner −Step 1 − Suppose there is a process P1 on ... Read More

Differentiate between ad-hoc mode and Wi-Fi Direct mode in 802.11 architecture

Bhanu Priya
Updated on 11-Sep-2021 14:28:35

1K+ Views

Let us understand what a Wi-Fi Direct mode is.Wi-Fi Direct ModeThe Wi-Fi Direct is built upon the same Wi-Fi technology used by most modern consumer electronic devices to communicate with wireless routers. It allows two devices to communicate with each other, provided that at least one of them is compliant with the standard to establish a peer-to-peer connection. Wi-Fi Direct is supported by more devices than most people realize.This mode is shown below −Here, 1 is the Printer2 is the Computer with a wireless interface3 is the Mobile or Another wireless device.Ad-Hoc modeCollections of computers are associated so that they ... Read More

Differentiate between infrastructure mode and the ad hoc mode of IEEE 802.11

Bhanu Priya
Updated on 11-Sep-2021 14:27:49

16K+ Views

802.11 architecture uses two types of modes, which are as follows −Infrastructure ModeThe most popular mode used to connect clients like laptops and smartphones to another network such as company intranet or internet.This mode is shown below −In infrastructure mode every client is associated with an Access point which is in turn connected to another network. The client sends and receives its packet via Access Point.Ad-Hoc ModeCollections of computers are associated so that they can directly send frames to each other. There is no Access Point in Ad hoc, because Internet access is the killer application for wireless. Ad hoc ... Read More

What is the performance of ethernet and token ring under light traffic load?

Bhanu Priya
Updated on 11-Sep-2021 14:26:16

388 Views

Ethernet is a way of connecting computers together in LAN, it is the most widely used method of linking computers together in LANs. The basic idea of its design is that multiple computers have access to it and can send data at any time.Token Ring is also a computer networking technology which is used to build local area networks where all stations are connected in a ring topology and pass one or more tokens for channel acquisition.EthernetThe performance of Ethernet under light traffic load is explained below in stepwise manner −Step 1 − Ethernet is a computer networking technology which ... Read More

What is Ethernet evolution in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 14:25:39

3K+ Views

Ethernet was developed at Xerox PARC between 1973 and 1974. Engineer Bob Metcalfe invented it for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed laser printers.It was originally intended to create a network in a small area known as a Local Area Network (LAN).In 1983 the first iteration of Ethernet 10Base 5, was released.In 1985 thin coaxial cable was approved and the group made changes to the specification in 1987, 1990 and 1993.In 1995 so called Fast Ethernet introduced it contains speed and duplex mode (both side transmitting at same time)In 1998 ... Read More

What is binary countdown protocol in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 14:21:52

903 Views

The collision free protocols are of three type and they are as follows −Bit map protocolToken passingBinary countdownNow let see about binary countdown protocol −Binary CountdownThe binary countdown is explained below in stepwise manner −Step 1 − A problem with the bit map protocol and token passing is that overhead is 1 bit per station, so bitmap and token passing will not suit the networks with thousands of stations.Step 2 − A station wants to use the channel. It has to broadcast its address as a binary bit string starting with a high order bit.Step 3 − All addresses are ... Read More

What is Bit Map protocol in computer networks?

Bhanu Priya
Updated on 11-Sep-2021 14:21:20

2K+ Views

Bit map protocol is called collision free Protocol. In bitmap protocol, each contention period consists of exactly N slots. If any station has to send a frame, then it transmits a 1 bit in the respective slot.Bitmap AlgorithmThe algorithm of Bit Map protocol is explained below −Step 1 − We use the bitmap or the bit vector which represents a finite set of distinct integers.Step 2 − To sort the array of integers, initialization of the array size to the specified range is needed and then fill it with zeroes which is a default value in the program followed by ... Read More

Advertisements