Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
MCA Articles
Page 37 of 94
What are the services provided by the Network Layer?
Network layer is the third layer in the OSI model of computer networking. Packet forwarding including routing through routers and quality of service management are done by the network layer.Nature of the serviceThe transport layer at the host side receives the service provided by the network layer. But the transport layer resides in the hosts while the network layer resides in the subnet.We know the subnet is a collection of routers which consists of only the bottom three layers. Hence, we can say that the service provided by the network layer to the transport layer is more effective, than the ...
Read MoreWhat is three-bit sliding window protocol?
Sliding window protocol is a transmission control protocol. To hold the outgoing and incoming packets both the sender and receiver maintains a finite buffer. Every packet sent from the sender side must be acknowledged by the receiver.The sender is maintaining a timer for every packet sent, and any unacknowledged packet in a certain time is resent. The sender will send a complete window of packets before receiving an acknowledgement for the first packet in the window. This leads to a higher transfer rate, as the sender may send multiple packets without waiting for each packet's acknowledgement.The Receiver advertises a window ...
Read MoreWhat are transmission and propagation delay?
Network delay is defined as how much time will take a bit of data to travel from one node to another node.Network delay can be divided into following ways −Transmission delayPropagation delayLet us learn about both of them in detail.Transmission delayIt is the time required to put a packet’s bit (or data bits) on the transmission medium that can be wired or wireless. Transmission delay depends on the length of the packet and bandwidth of the network.Transmission delay can be calculated as follows −Transmission delay = Packet size / bandwidth packet ...
Read MoreWhat is Traffic Throttling in computer networks?
Traffic throttling is one of the approaches for congestion control. In the internet and other computer networks, senders trying to adjust the transmission need to send as much traffic as the network can readily deliver. In this setting the network aim is to operate just before the onset of congestion.There are some approaches to throttling traffic that can be used in both datagram and virtual-circuit networks.Each approach has to solve two problems −FirsRouters have to determine when congestion is approaching ideally before it has arrived. Each router can continuously monitor the resources it is using.There are three possibilities, which are ...
Read MoreWhat is an admission control approach for congestion control?
The presence of congestion means the load is greater than the resources available over a network to handle. Generally, we will get an idea to reduce the congestion by trying to increase the resources or decrease the load, but it is not that much of a good idea.There are some approaches for congestion control over a network which are usually applied on different time scales to either prevent congestion or react to it once it has occurred.Admission ControlIt is one of techniques that is widely used in virtual-circuit networks to keep congestion at bay. The idea is do not set ...
Read MoreWhat is traffic aware routing in computer networks?
Traffic awareness is one of the approaches for congestion control over the network. The basic way to avoid congestion is to build a network that is well matched to the traffic that it carries. If more traffic is directed but a low-bandwidth link is available, congestion occurs.The main goal of traffic aware routing is to identify the best routes by considering the load, set the link weight to be a function of fixed link bandwidth and propagation delay and the variable measured load or average queuing delay.Least-weight paths will then favour paths that are more lightly loaded, remaining all are ...
Read MoreHow to do Fuzzy Matching on Pandas Dataframe Column Using Python?
We will match words in the first DataFrame with words in the second DataFrame. For closest matches, we will use threshold. We took the value of threshold as 70 i.e., match occurs when the strings at more than 70% close to each other.Let us first create Dictionaries and convert to pandas dataframe −# dictionaries d1 = {'Car': ["BMW", "Audi", "Lexus", "Mercedes", "Rolls"]} d2 = {'Car': ["BM", "Audi", "Le", "MERCEDES", "Rolls Royce"]} # convert dictionaries to pandas dataframes df1 = pd.DataFrame(d1) df2 = pd.DataFrame(d2)Now, convert dataframe column to list of elements for fuzzy matching −myList1 = df1['Car'].tolist() myList2 = ...
Read MoreWhat is physical layer coding violation?
Data link layer translates the physical layers raw bit stream into discrete messages called frames. Now the question is how can a frame be transmitted, so the receiver can recognize the start and end frame?TechniquesThe techniques we used to find the start and end frame are −Character countFlag byte with byte stuffingStarting and ending flag with bit stuffingEncoding Violation.Now let us see the Physical layer encoding violation technique.Physical layer encoding violationThis framing method is used only in those networks in which encoding on the physical medium contain some redundancy.Some LANs encode each bit of data by using two physical bits ...
Read MoreWhat is the character count? Explain with an example?
Data link layer translates the physical layers raw bit stream into discrete messages called frames. Now the question is how can a frame be transmitted, so the receiver can recognize the start and end frame?TechniquesThe techniques we used to find the start and end frame are −Character countFlag byte with byte stuffingStarting and ending flag with bit stuffingEncoding Violation.Now let us see the character count technique.Character CountFirst framing method uses a field in the header to specify the number of characters in the frame. When the data link layer at the destination sees the character count, it knows how many ...
Read MoreWhat are elementary data link layer protocols?
Elementary Data Link protocols are classified into three categories, as given below −Protocol 1 − Unrestricted simplex protocolProtocol 2 − Simplex stop and wait protocolProtocol 3 − Simplex protocol for noisy channels.Let us discuss each protocol one by one.Unrestricted Simplex ProtocolData transmitting is carried out in one direction only. The transmission (Tx) and receiving (Rx) are always ready and the processing time can be ignored. In this protocol, infinite buffer space is available, and no errors are occurring that is no damage frames and no lost frames.The Unrestricted Simplex Protocol is diagrammatically represented as follows −Simplex Stop and Wait protocolIn ...
Read More