Network Articles - Page 55 of 66

What are the elements of Transport Protocol?

Ginni
Updated on 06-Sep-2023 21:45:32

80K+ Views

To establish a reliable service between two machines on a network, transport protocols are implemented, which somehow resembles the data link protocols implemented at layer 2. The major difference lies in the fact that the data link layer uses a physical channel between two routers while the transport layer uses a subnet.Following are the issues for implementing transport protocols−Types of ServiceThe transport layer also determines the type of service provided to the users from the session layer. An error-free point-to-point communication to deliver messages in the order in which they were transmitted is one of the key functions of the ... Read More

What is FDDI in the Computer Network?

Ginni
Updated on 05-May-2021 11:06:10

5K+ Views

FDDI stands for Fiber Distributed Data Interface. It is a collection of ANSI and ISO standards for data transmission on fiber-optic lines in a local area network (LAN) that can broaden in the range up to 200 km (124 miles). The FDDI protocol depends on the token ring protocol.FDDI cabling consists of two fiber rings, one transmitting clockwise and the other transmitting counterclockwise. Fiber Distributed Data Interface (FDDI) is generally implemented as a dual token-passing ring within a ring topology (for campus networks) or star topology (inside a building). The dual ring includes a primary and secondary ring.The primary ring ... Read More

Explain the Error Reporting Messages in ICMP Protocol

Ginni
Updated on 05-May-2021 11:04:51

7K+ Views

The error-reporting message defines that the router encounters a problem when it processes an IP packet, then it reports a message. Error messages are continually transmitted to the original source because the only data possible in the datagram around the route is the source and destination IP addresses.The error reporting messages are generally classified into the following types−When a router cannot route a datagram, or a host cannot transfer a datagram, the datagram is rejected, and the router or the host share a destination-unreachable message back to the source host that proposed the datagram.Destination unreachable messages with codes 2 or ... Read More

What is ICMP Protocol?

Ginni
Updated on 05-May-2021 10:44:07

5K+ Views

The ICMP represents Internet Control Message Protocol. It is a network layer protocol. It can be used for error handling in the network layer, and it is generally used on network devices, including routers. IP Protocol is a best-effect delivery service that delivers a datagram from its original source to its final destination. It has two deficiencies−Lack of Error ControlLack of assistance mechanismsIP protocol also lacks a structure for host and management queries. A host needs to resolve if a router or another host is alive, and sometimes a network manager needs information from another host or router.ICMP has been ... Read More

Mobile

What is Reverse Address Resolution Protocol (RARP)?

Ginni
Updated on 05-May-2021 10:41:58

12K+ Views

Reverse Address Resolution Protocol (RARP) is a network-specific standard protocol. It is described in RFC 903. Some network hosts, such as a diskless workstation, do not know their own IP address when they are booted. To determine their own IP address, they use a mechanism similar to ARP, but now the hardware address of the host is the known parameter, and the IP address is the queried parameter.The reverse address resolution is performed the same way as the ARP address resolution. The same packet format is used for the ARP.An exception is the operation code field that now takes the ... Read More

What is the Function of Protocol?

Ginni
Updated on 05-May-2021 10:34:33

11K+ Views

Protocol suites are collecting protocols that act at different layers of the network model to ensure successful communication. There is the various function of the protocol, which are as follows−Connection Establishment/ReleaseA data transfer can be a communication-oriented transfer or connectionless transfer. The connectionless services are the most unreliable services. Most of the protocols provide connection-oriented services. If a large volume of data transfer is required, connectionoriented services are always better.EncapsulationA protocol defines how the data is encapsulated in the frame or packet. Each packet in all PDUs contains three fields for control information along with the data field. There are ... Read More

What is Multimedia in the Computer Network?

Ginni
Updated on 05-May-2021 10:32:36

10K+ Views

Multimedia is a set of more than one media element used to produce a concrete and more structured communication method. In other words, multimedia is the simultaneous use of data from different sources. These sources in multimedia are known as media elements.Multimedia is the holy grail of networking. It brings vast technical challenges in providing (interactive) video on demand to every home and equally immense profits out of it. Multimedia is just two or more media. Generally, the term multimedia means the combination of two or more continuous media. In practice, the two media usually are audio and video.Elements of ... Read More

What is Congestion Control Algorithm?

Ginni
Updated on 01-Nov-2023 06:04:30

66K+ Views

Congestion causes choking of the communication medium. When too many packets are displayed in a method of the subnet, the subnet's performance degrades. Hence, a network's communication channel is called congested if packets are traversing the path and experience delays mainly over the path's propagation delay. There is two congestion control algorithm which is as follows: Leaky Bucket The leaky bucket algorithm discovers its use in the context of network traffic shaping or rate-limiting. The algorithm allows controlling the rate at which a record is injected into a network and managing burstiness in the data rate. ... Read More

What are the types of IPv4 Addresses?

Ginni
Updated on 05-May-2021 10:23:41

6K+ Views

IPv4 supports various types of addressing modes which are as follows−UnicastIt is created to a single network interface located on a specific subnet and facilitates one to-one communication. This is a unique address worldwide for the identification of a machine on the network.Subnet prefix: The subnet prefix is a network identifier or network address portion of an IP unicast address. It must be noted that all nodes on the corresponding physical or logical subnet must help the same subnet prefix, which eventually turns into unique within the entire TCP/IP network.Host ID: The host ID, a host address area of an ... Read More

What is IPv4 Addressing?

Ginni
Updated on 05-May-2021 10:19:29

3K+ Views

IPv4 addresses are merely used as identifiers, which operate at the network layer to identify IP packets source or destination. The version of IP that is in use is known as IPv4. In this version, every node on the Internet can have one or more interfaces, and we are needed to recognize each of these devices with a specific address assigned to each of them. It represents that each node is created one or more IP addresses to conjure TCP/IP. These are logical addresses and include 32 bits.IP addresses are defined using binary notation with a 32-bit long string. Dotted ... Read More

Advertisements