What is the IPv6 Protocol in Computer Network

Ginni
Updated on 05-May-2021 10:36:40

12K+ Views

Internet Protocol version 6 (IPV 6) is the replacement for version 4 (IPV 4). The phenomenal development of the Internet has begun to push IP to its limits. It provides a large address space, and it contains a simple header as compared to IPv4.Features of IPV6There are various features of IPV6, which are as follows−Larger address space: An IPV6 address is 128 bits long. It is compared with the 32-bit address of IPV4. It will allow for unique IP-addresses up to 3.4 x 1038 whereas IPV4 allows up to 4.3 x 108 unique address.Better Header format: New header form has ... Read More

Function of Protocol

Ginni
Updated on 05-May-2021 10:34:33

11K+ Views

Protocol suites are collecting protocols that act at different layers of the network model to ensure successful communication. There is the various function of the protocol, which are as follows−Connection Establishment/ReleaseA data transfer can be a communication-oriented transfer or connectionless transfer. The connectionless services are the most unreliable services. Most of the protocols provide connection-oriented services. If a large volume of data transfer is required, connectionoriented services are always better.EncapsulationA protocol defines how the data is encapsulated in the frame or packet. Each packet in all PDUs contains three fields for control information along with the data field. There are ... Read More

What is Data Encryption in the Computer Network

Ginni
Updated on 05-May-2021 10:32:58

3K+ Views

Encryption is a technique to hide data from unauthorized persons by encoding data not to be viewed and modified. Data encryption involves converting the data into encrypted data called cipher text using a mathematical formula called an algorithm.These algorithms generate a key and then encapsulate the message with this key. There are two types of encryptions as asymmetric and symmetric, are in vogue.The presentation layer deals with the translation, encryption/decryption, authentication and compression, which are explained below−TranslationIt changes the complex data structures used by an application string, integers, structures, etc., into a byte stream that may be transmitted across the ... Read More

What is an Adaptive Routing Algorithm in Computer Network

Ginni
Updated on 05-May-2021 10:32:55

2K+ Views

This Algorithm changes its routing persistence to pursue changes within the topology and traffic also. Routing decisions are often changed when network topology and load change. Adaptive routing aims to assist avoid packet delivery failure, improve network performance and relieve network congestion.Adaptive routing can generate nodes to develop into overloaded because of the complex processing decisions they create. Because routers send data about the network topology, adaptive routing is often less ensure than non-adaptive routing processes and needed more bandwidth.It is equivalent to GPS, which uses data about road conditions to redirect drivers, adaptive routing uses data about network congestion ... Read More

What is Multimedia in Computer Network

Ginni
Updated on 05-May-2021 10:32:36

10K+ Views

Multimedia is a set of more than one media element used to produce a concrete and more structured communication method. In other words, multimedia is the simultaneous use of data from different sources. These sources in multimedia are known as media elements.Multimedia is the holy grail of networking. It brings vast technical challenges in providing (interactive) video on demand to every home and equally immense profits out of it. Multimedia is just two or more media. Generally, the term multimedia means the combination of two or more continuous media. In practice, the two media usually are audio and video.Elements of ... Read More

What is Quality of Service (QoS)?

Ginni
Updated on 05-May-2021 10:32:07

22K+ Views

Quality of Service (QOS) determines a network's capability to support predictable service over various technologies, containing frame relay, Asynchronous Transfer Mode (ATM), Ethernet, SONET IP-routed networks. The networks can use any or all of these frameworks.The QOS also provides that while supporting priority for one or more flows does not create other flows fail. A flow can be a combination of source and destination addresses, source and destination socket numbers, session identifier, or packet from a specific application or an incoming interface.The QOS is primarily used to control resources like bandwidth, equipment, wide-area facilities etc. It can get more efficient ... Read More

Routing Algorithms in Computer Network

Ginni
Updated on 05-May-2021 10:31:45

2K+ Views

The services of the network layer are routing the packets from source to destination devices. It can do this in a single pass or many passes. The algorithm which selects the routes and data structures that they facilitate is known as the routing algorithm. This is a significant field of network layer design. They are that element of network layer application responsible for transmitting the output channel for an incoming packet.In the case of datagrams, the decisions create new for each appearing data packet, and in the case of the virtual circuit, they are made only once, i.e., when a ... Read More

Services Provided by Network Layer in Computer Network

Ginni
Updated on 05-May-2021 10:30:00

3K+ Views

This layer is the third layer of the OSI model, and it is the lowest layer that manages end to end transmission and provides services to the transport layer. The network layer’s primary role is to route the messages associated with the higher protocol layer above it and across the network (the network which links the distributed DTEs systems).The Network Layer can operate both in a connectionless-mode as well as in a connectionoriented mode. In LANs, the frame is addressed and routed between nodes attached to the same LAN using their point of attachment address.The network layer is also known ... Read More

Data Link Protocols in Computer Network

Ginni
Updated on 05-May-2021 10:29:06

2K+ Views

Protocols define a collection of rules or conventions for executing a definite function. It is a collection of the requirements that can manage the data link layer. The fundamental goals of computer broadcasting in a system environment are to transmit a limitless huge message from the source hub to the destination hub.The major service of the Data Link Layer is to send the datagram across a single connection. In Data Link Layer, the datagram can be managed by various link layer protocols on multiple connections in a path. For example, the datagram is managed by Ethernet on the primary link, ... Read More

Difference Between Datagram Approach and Virtual Circuit in Computer Network

Ginni
Updated on 05-May-2021 10:24:11

6K+ Views

Datagram ApproachA packet-switching technology in which a packet exists is called a datagram. It is treated as a separate entity. Each packet includes data about the destination, and the switch helps this data forward the packet to the right destination. It is also known as connectionless switching.Virtual CircuitVirtual Circuit is also referred to as connection-oriented switching. A fixed, consistent direction through the transmitter’s network is settled in the virtual circuit method earlier any packets are transmitted. This direction remains constant for the session period.DifferencesThe major differences between the datagram approach and virtual circuit are as follows −Datagram ApproachVirtual CircuitThere is ... Read More

Advertisements