- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1627 Articles for Computer Network
152 Views
The manager sends a request to an agent, and the agent responds to the request, known as Request/Response interaction. The request is usually used to retrieve or modify management information associated with the network device.Requests which are generated by the manager can be as follows −Get request-PDU − In this manager generates a request for requesting information on specific variables.Get Bulk request Bulk − The manager generates a request for bulk information retrieval introduced in SNMP version 2. It allows the return of as much information as possible in a packet.Set request PDU − It creates or modifies management information ... Read More
6K+ Views
SNMP stands for Simple Network Management Protocol. It is an Internet-standard protocol for handling devices on IP networks. Devices that typically provide SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mainly in the network management framework to monitor network-attached computers for conditions requiring regulatory attention.It is a framework for managing devices on the Internet using the TCP-IP protocol suite. It supports a set of fundamental operations for monitoring and maintaining the Internet.SNMP ConceptSNMP facilitates the concept of manager and agent. A manager, generally a host, controls and monitors a group of agents, usually routers. ... Read More
5K+ Views
Network Management involves monitoring and controlling a network system so that it can operate properly without downtime. So, the function performed by a network management system are categorised as follows −Fault managementFault management is the procedure of technology used to manage the administrator who prevents faults within a networked system so that the availability of downtime is reduced by identifying, isolating and fixing any malfunctions that occur. It can support active and passive components to disavow fault.Configuration managementIt refers to the process of initially configuring a network and then adjusting it in response to changing networks requirements. This function is ... Read More
9K+ Views
Network management is the procedure of administering, managing and working a data network using a network management system. Current network management systems use software and hardware to constantly collect and analyse data and push out configuration changes for increasing performance, reliability, and security.It involves configuring monitoring and possibly reconfiguring components in a network with the goal of providing optimal performance, minimum downtime, proper security, accountability and flexibility.FeaturesThere are various features of network management which are as follows −Network automationOne defining feature of a modern network management system is network automation. This is the procedure of automating the configuring, handling, testing, ... Read More
2K+ Views
POP stands for Post Office Protocol. It provides a standard mechanism for retrieving emails from a remote server for a mail recipient. For instance, suppose that a home user A usually connects to the Internet using a dial-up connection to an ISP.Suppose that another person, B, has sent an e-mail to A, when A is a net connected to the Internet. The email gets stored in the mailbox for user A provided by the ISP.When A connects to the Internet the next time and wants to see the new e-mail that has arrived, he opens his email client program. That ... Read More
4K+ Views
MIME represents Multi-Purpose Internet Mail Extensions. It is a development to the Internet email protocol that enables its users to exchange several kinds of data files over the Internet, including images, audio, and video.The MIME is required if the text in character sets other than the American Standard Code for Information Interchange (ASCII). Virtually, all human-written Internet email and a fairly large proportion of automated email is transmitted via Simple Mail Transfer Protocol (SMTP) in MIME format.MIME was designed mainly for SMTP, but the content types defined by MIME standards are important also in communication protocols outside of email, such ... Read More
5K+ Views
ATM transfers data in fixed-size units are known as cells. Each cell includes 53 octets or bytes, as shown in the figure. The first 5 bytes contain cell-header data, and the remaining 48 include the payload (user information).Small, fixed-length cells are well appropriated to transfer voice and video traffic due to such traffic is biased to delays that result from having to wait for a huge data packet to download, among other things.HeaderPayload5 Bytes48 BytesATM Cell FormatAn ATM cell header can be two formats, such as User Network Interface (UNI) or Network to Network Interface (NNI). The UNI header can ... Read More
404 Views
The User Datagram Protocol (UDP) is a very simple protocol in the Computer Network. Its inserts are limited to the fundamental functionality of Internet Protocol (IP). Like IP, it is an uncertain, connectionless protocol.We do not require to establish a connection with a host before exchanging data with it by using UDP. Also, there is no structure for providing information if the data which is sent is properly received or not. A unit of data transmitted by using UDP is known as a Datagram.UDP inserts four 16-bit header fields (8 bytes) to whatever data is transmitted. These fields are a ... Read More
17K+ Views
Following are some of the services offered by the Transmission Control Protocol (TCP) to the processes at the application layer:Stream Delivery Service.Sending and Receiving Buffers.Bytes and Segments.Full Duplex ServiceConnection Oriented Service.Reliable Service.All the above mentioned TCP services are explained below in detail.Stream Delivery ServiceTCP is a stream-oriented protocol. It enables the sending process to deliver data as a stream of bytes and the receiving process to acquire data as a stream of bytes.TCP creates a working environment so that the sending and receiving procedures are connected by an imaginary "tube", as shown in the figure below:Sending and Receiving BuffersThe sending ... Read More
455 Views
When data is shared from one computer to another computer, the system does not protect whether the information received by the computer is actually to the data transmitted by another computer. An error is when the message received at the receiver end is not interchangeable with the message sent.Types of ErrorsFollowing are the types of errors −Single-Bit ErrorThese errors occur when only a single bit in a data packet is changed from 1 to 0 or 0 to 1. These types of errors are most likely to happen in the parallel transmission of data.Suppose a block of data is sent ... Read More
To Continue Learning Please Login
Login with Google