The Distance-Vector routing algorithm is known by other names. Bellman-Ford routing algorithm and the Ford-Fulkerson algorithm are generally distributed after the researchers create it (Bellman 1957, and Ford and Fulkerson, 1962).FeaturesFollowing are the features of the distance vector routing are −The routers send the knowledge of the whole autonomous framework.Sharing of data takes place only with the neighbours.Sending of data holds place at constant, ordinary intervals, declared every 30 seconds.In this algorithm, each router evaluates the distance between itself and every achievable destination. This is accomplished by assessing the distance between a router and all of its immediate router neighbours ... Read More
Non-adaptive algorithm or static routing is independent of the current traffic and topology volume. They determine the route to which a datagram is to send off-line. The route is computed and downloaded to the routers when the network is booted. Thus, routing data is manually specified. It provides fixed-route data to each router. If there is no transform in route, it is created manually. This procedure is also called static routing.Random WalkIn this technique, a packet is transmitted by the node to one of its neighbours casually. This algorithm is hugely powerful. When the network is hugely associated, this algorithm ... Read More
The network layer offers its functions to the transport layer, and for that, it takes services of the data link layer. Its functions are carried out by adding a header to every Network Service data unit (N-SDU). This header is in the form of Protocol Control Information (PCI). Thus a formed Network protocol data unit is transported over the existing data-link connection.The functions of the network layer are as follows −Network ConnectionWhen the Network layer receives a call request from the transport layer, it establishes a network connection across the subnetwork. For this, it makes use of data link connections. ... Read More
PPP is a protocol that is generally used to provide similar functionality as SLIP. It is the best robust protocol that can transfer different types of packets also along with IP Packets. It can also be needed for dial-up and hired router-router lines. It generally supports the framing techniques to represent frames. It can transfer diagrams across a serial connection to transfer IP traffic over the point-to-point connection as an encapsulation protocol.It can provide the responsibility and executive of IP addresses, asynchronous and bit-oriented synchronous encapsulation, network protocol multiplexing, link configuration, etc. It can support an extensible Link Control Protocol (LCP) ... Read More
A mode in HDLC is the realigning between two machines contained in a network. The mode describes who controls the link. HDLC determines three types of stations such as primary, secondary, and combined.A primary station is a controlling station on a connection. It controls the secondary stations on the connection and handles data flow and error recovery.A secondary station as existing on a connection where there is a primary station. The secondary station is contained by the primary station and has no explicit authority for maintaining the connection.A combined station is a combination of primary and secondary stations.HDLC Operational ModesThere ... Read More
The HDLC process is regulated by the International Organization for Standardization (ISO). This is possible for high-speed communication of a high amount of information. The necessary control process cannot support this communication.The HDLC process has been regulated and established on the SDLC. In addition to the characters, bit strings of the acquired length can also be sent through this process. The unit of data communication is known as a frame.HDLC Frame StructureTo provide support for all options in the mode and configuration, HDLC defines three types of frames.Information Frames (IF)The I-Frame is as follows −FlagAddressControl User Information FCS Flag ... Read More
The Hamming code can be used to the data units of any length when we consider the two codewords which have the same length. The Hamming distance between two codewords is represented as the number of positions in which their specific item differs.ExampleHamming Distance is 3.Hamming code is also known as linear block code. The family of (n, k) hamming codes for m is defined.Block length n=2m-1.The number of message bits k=2m-m-1.Number of Parity Bits = n-k=m.Where m≥3Minimum distancemin=3.Code rate = Code efficiency = $\frac{k}{n} = \frac{2^{m}-m-1}{2^{m}-1} = 1 - \frac{m}{2^{m}-1}$ of m>> 1then, code rate r=1 where k is ... Read More
In the detection method, only the error can be detected. Still, in the error correction method, the errors are corrected automatically at the receiver end and no need for re-transmission. The burst error correction is very limited to 2 bits only.Each kbit block of data is added with redundant bits that make a codeword of n bits (n > k). A forward error correction encoder is used on the transmission end. Then, the codeword is transmitted. The signal is demodulated to make a bit string equivalent to the initial codeword to include the errors at the receiver.If no bit error, ... Read More
Parity Bit is the simplest and frequently used method for detecting an error. In this method, we have to join a parity bit to the end of the data structure. The bit is so chosen that the weight of codeword is either even or odd of, i.e. V is the cost of this bit is chosen therefore that the character has an even number of 1's called even parity or an odd number of 1's known as odd parity.For Example, If the transmitter is transmitting 1110001 and using odd parity. It willappend 1 in sorting. The receiver determines the received ... Read More
There are a few effects of errors which are as follows −Attenuation: Due to error, the signal may get attenuated, i.e., the data may be costly in the extreme case.Delay Distortion: Due to this error at the receiving end, the wave is distorted due to a delay in transmission.Interference in voice communication can occur due to an error in the signal.Echo can be produced because the sender cannot hear the receivers answer or voice.Cross talk can occur because of the error in the broadcasted signal. Due to this, the faint voice of another party may disturb your signal.Data Error Rate: (P10):Probability that ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP