Found 81 Articles for Communication

Features of Good Message Passing in Distributed System

Satish Kumar
Updated on 29-Sep-2023 13:25:59

549 Views

In a distributed system, message passing is a critical component of communication between processes or nodes. Message passing allows processes to share data, coordinate their activities, and respond to changes in system. A well-designed message passing system can improve performance, reliability, and scalability of a distributed system. In this article, we will discuss features of good message passing in distributed systems and provide examples of how these features can be implemented. Reliability Reliability is one of most important features of message passing in distributed systems. Messages should be delivered to intended recipient, even in presence of failures, network delays, and ... Read More

Features of Enhanced Interior Gateway Routing Protocol (EIGRP)

Satish Kumar
Updated on 29-Sep-2023 13:11:23

145 Views

Introduction The Enhanced Interior Gateway Routing Protocol (EIGRP) is a widely used routing protocol in computer networks. It is an advanced version of Interior Gateway Routing Protocol (IGRP), which was developed by Cisco Systems. EIGRP is an advanced, distance vector, routing protocol that provides faster convergence and better scalability compared to other distance vector routing protocols. This article will discuss features of EIGRP that make it one of most preferred routing protocols for large networks. Fast Convergence One of significant features of EIGRP is its fast convergence. Convergence is process by which all routers in a network come to agree ... Read More

Fast Recovery Technique For Loss Recovery in TCP

Satish Kumar
Updated on 29-Sep-2023 13:08:44

445 Views

Introduction Transmission Control Protocol (TCP) is a widely used protocol for data transmission over internet. However, data transmission over TCP is not always error-free. transmission can be disrupted due to several reasons such as network congestion, packet loss, or failure of intermediate devices. In such cases, TCP uses a loss recovery technique to recover lost data and retransmit it. This technique is crucial in ensuring reliability of data transmission over internet. In this article, we will discuss fast recovery technique for loss recovery in TCP. Understanding TCP loss recovery technique TCP uses a three-way handshake mechanism to establish a connection ... Read More

Extended Access List

Satish Kumar
Updated on 29-Sep-2023 13:01:33

133 Views

Introduction Access control lists (ACLs) are an important component of network security. ACLs are used to regulate network traffic and restrict access to network resources. An ACL is a set of rules that is applied to a network interface, router or firewall, which dictates which packets are allowed to pass through and which are dropped. ACLs can be either standard or extended, and they can be configured to allow or deny traffic based on source and destination IP addresses, protocols, and port numbers. In this article, we will explore extended access list in network security, its importance, and how to ... Read More

Explicitly assigning port number to client in Socket

Satish Kumar
Updated on 29-Sep-2023 12:55:42

204 Views

Introduction When building client-server applications using sockets, it's essential to assign a unique port number to each client to ensure proper communication between server and clients. By explicitly assigning a port number to each client, server can identify and communicate with individual clients without confusion or overlap. In this article, we'll explore importance of assigning port numbers to clients and how to do so effectively. What is a port number? In context of networking, a port number is a 16-bit unsigned integer that uniquely identifies a specific process to which a network packet is directed. When a client sends a ... Read More

Explain Parameter passing Semantics in RPC

Satish Kumar
Updated on 29-Sep-2023 12:41:04

403 Views

Remote Procedure Call (RPC) is a communication protocol that enables a process running on one computer to invoke a procedure in another process running on a remote computer. procedure call appears to caller as a local procedure call, but in reality, call is transmitted over a network. RPC involves several aspects such as marshaling of parameters, handling of return values, and communication between client and server. In this article, we will focus on parameter passing semantics in RPC. We will discuss various parameter passing methods and their characteristics, including pass-by-value, pass-by-reference, pass-by-result, and pass-by-object-reference. We will also provide examples to ... Read More

Threema Alternatives

Shirjeel Yunus
Updated on 28-Sep-2023 14:19:39

68 Views

What is Threema? Threema is a messenger and it also has the ability to secure your data from hackers. Governments, and corporations. It is an open-source app which can be used to make video and voice calls with end-to-end encryption. Web and desktop interfaces of the platform are available. You can also make arrangements for polls and have private chats Price Plans of Threema There are three price plans that Threema offers to its users. The price of each plan can be found in the table below − Plan Cost Essential $2 Professional ... Read More

Excalidraw Alternatives

Shirjeel Yunus
Updated on 28-Sep-2023 13:40:35

340 Views

What is Excalidraw? Excalidraw is a whiteboard that can be used to make sketches and write texts. You can take notes, make diagrams, and store them for future use. The tool can also be used to make different types of tutorials. The app is simple to use as you can make diagrams and format them by adding colors, filters, edges, etc. No setup is required to use the tool. You can share your notes and diagrams with your connections. Top 10 Excalidraw Alternatives Excalidraw has many alternatives which are discussed here in detail. The list is given below − ... Read More

Examples of TCP and UDP in Real Life

Satish Kumar
Updated on 27-Sep-2023 15:20:39

1K+ Views

Introduction TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of most commonly used internet protocols. They are both responsible for ensuring reliable data transfer between devices connected to a network. However, way they do so differs significantly. In this article, we will discuss some examples of TCP and UDP in real life applications. TCP in Real Life TCP is a connection-oriented protocol that is commonly used when reliability is primary concern. It is responsible for establishing a reliable and ordered data transfer between two devices. Some examples of TCP in real life applications are as follows − ... Read More

Evolution of Networks

Satish Kumar
Updated on 27-Sep-2023 15:19:22

504 Views

Introduction Human beings are social animals. They have always found ways to communicate and connect with each other. From ancient times, people used various forms of communication like writing, oral communication, and visual arts to convey their messages to others. With advent of technology, communication has become faster, easier, and more efficient. This led to development of networks that connected people across world. In this article, we will explore evolution of networks from ancient times to modern era. Ancient Networks Ancient networks were primarily based on oral communication and visual arts. In ancient civilizations like Sumerians, Egyptians, and Greeks, people ... Read More

Advertisements