Reverse Address Resolution Protocol (RARP) is a network-specific standard protocol. It is described in RFC 903. Some network hosts, such as a diskless workstation, do not know their own IP address when they are booted. To determine their own IP address, they use a mechanism similar to ARP, but now the hardware address of the host is the known parameter, and the IP address is the queried parameter.The reverse address resolution is performed the same way as the ARP address resolution. The same packet format is used for the ARP.An exception is the operation code field that now takes the ... Read More
Address Resolution Protocol (ARP) is a network-specific standard protocol. The Address Resolution Protocol is important for changing the higher-level protocol address (IP addresses) to physical network addresses. It is described in RFC 826.ARP relates an IP address with the physical address. On a typical physical network such as LAN, each device on a link is identified by a physical address, usually printed on the network interface card (NIC). A physical address can be changed easily when NIC on a particular machine fails.The IP Address cannot be changed. ARP can find the physical address of the node when its internet address ... Read More
Frequency Division Multiplexing (FDM) is a technology that transmits multiple signals simultaneously over a single transmission path, such as cable or wireless system. Each carrier is modulated by the data such as text, voice, video etc. Orthogonal FDM spread spectrum technique distributes the data over a large number of carriers that are spaced apart at precise frequencies. This spacing provides the “orthogonality.” This technique, which avoids the demodulators from seeing frequencies other than their own.The basic approach of OFDM is shown in the figure below −The benefit of OFDM is high spectral efficiency, resiliency due to RF interference and lower ... Read More
Bluetooth is a proprietary open wireless technology measure for exchanging information over short areas (using short-wavelength radio channels in the ISM band from 2400-2480 MHz) from permanent and mobile devices.It can be creating personal area networks (PANs) with high levels of security. It was made by telecoms vendor Ericsson in 1994, and it was initially conceived as a wireless method to RS-232 data cables. It can connect multiple devices, overcoming issues of synchronization.Bluetooth is handled by the Bluetooth Special Interest Group, which has more than 14, 000 member companies in telecommunication, computing, networking, and used electronics. Bluetooth is a free ... Read More
Internet Protocol version 6 (IPV 6) is the replacement for version 4 (IPV 4). The phenomenal development of the Internet has begun to push IP to its limits. It provides a large address space, and it contains a simple header as compared to IPv4.Features of IPV6There are various features of IPV6, which are as follows−Larger address space: An IPV6 address is 128 bits long. It is compared with the 32-bit address of IPV4. It will allow for unique IP-addresses up to 3.4 x 1038 whereas IPV4 allows up to 4.3 x 108 unique address.Better Header format: New header form has ... Read More
Protocol suites are collecting protocols that act at different layers of the network model to ensure successful communication. There is the various function of the protocol, which are as follows−Connection Establishment/ReleaseA data transfer can be a communication-oriented transfer or connectionless transfer. The connectionless services are the most unreliable services. Most of the protocols provide connection-oriented services. If a large volume of data transfer is required, connectionoriented services are always better.EncapsulationA protocol defines how the data is encapsulated in the frame or packet. Each packet in all PDUs contains three fields for control information along with the data field. There are ... Read More
Encryption is a technique to hide data from unauthorized persons by encoding data not to be viewed and modified. Data encryption involves converting the data into encrypted data called cipher text using a mathematical formula called an algorithm.These algorithms generate a key and then encapsulate the message with this key. There are two types of encryptions as asymmetric and symmetric, are in vogue.The presentation layer deals with the translation, encryption/decryption, authentication and compression, which are explained below−TranslationIt changes the complex data structures used by an application string, integers, structures, etc., into a byte stream that may be transmitted across the ... Read More
This Algorithm changes its routing persistence to pursue changes within the topology and traffic also. Routing decisions are often changed when network topology and load change. Adaptive routing aims to assist avoid packet delivery failure, improve network performance and relieve network congestion.Adaptive routing can generate nodes to develop into overloaded because of the complex processing decisions they create. Because routers send data about the network topology, adaptive routing is often less ensure than non-adaptive routing processes and needed more bandwidth.It is equivalent to GPS, which uses data about road conditions to redirect drivers, adaptive routing uses data about network congestion ... Read More
Multimedia is a set of more than one media element used to produce a concrete and more structured communication method. In other words, multimedia is the simultaneous use of data from different sources. These sources in multimedia are known as media elements.Multimedia is the holy grail of networking. It brings vast technical challenges in providing (interactive) video on demand to every home and equally immense profits out of it. Multimedia is just two or more media. Generally, the term multimedia means the combination of two or more continuous media. In practice, the two media usually are audio and video.Elements of ... Read More
Quality of Service (QOS) determines a network's capability to support predictable service over various technologies, containing frame relay, Asynchronous Transfer Mode (ATM), Ethernet, SONET IP-routed networks. The networks can use any or all of these frameworks.The QOS also provides that while supporting priority for one or more flows does not create other flows fail. A flow can be a combination of source and destination addresses, source and destination socket numbers, session identifier, or packet from a specific application or an incoming interface.The QOS is primarily used to control resources like bandwidth, equipment, wide-area facilities etc. It can get more efficient ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP