Found 826 Articles for Network

What is Congestion Control in the Computer Network?

Ginni
Updated on 05-May-2021 10:22:17

18K+ Views

Congestion causes choking of the communication channel. When too many packets are displayed in a part of the subnet, the subnet's performance degrades. Hence, the network's communication channel is called congested if packets are traversing the path experience primarily over the path propagation delay.It is known as heavily congested when the packets never reach the destination, denoting the delay method infinity. When the input traffic rate exceeds the output lines capacity, the subnet's input part gets choked and generates congestion. It also happens when the routers are too slow to execute queuing buffers, refreshing tables, etc. The loss of capacity ... Read More

What are the types of IPv4 Addresses?

Ginni
Updated on 05-May-2021 10:23:41

3K+ Views

IPv4 supports various types of addressing modes which are as follows−UnicastIt is created to a single network interface located on a specific subnet and facilitates one to-one communication. This is a unique address worldwide for the identification of a machine on the network.Subnet prefix: The subnet prefix is a network identifier or network address portion of an IP unicast address. It must be noted that all nodes on the corresponding physical or logical subnet must help the same subnet prefix, which eventually turns into unique within the entire TCP/IP network.Host ID: The host ID, a host address area of an ... Read More

What is IPv4 Addressing?

Ginni
Updated on 05-May-2021 10:19:29

2K+ Views

IPv4 addresses are merely used as identifiers, which operate at the network layer to identify IP packets source or destination. The version of IP that is in use is known as IPv4. In this version, every node on the Internet can have one or more interfaces, and we are needed to recognize each of these devices with a specific address assigned to each of them. It represents that each node is created one or more IP addresses to conjure TCP/IP. These are logical addresses and include 32 bits.IP addresses are defined using binary notation with a 32-bit long string. Dotted ... Read More

What is a Routing Table in a Computer Network?

Ginni
Updated on 05-May-2021 10:18:58

956 Views

Each router on the network supports a routing table in memory that may be simple or complex. In the simplest form, the table consists of pairs of IP addresses.When the originating station involves that the intended destination is directly reachable, the frame is sent immediately to the frame's destination IP address. In such a situation, a unique address occurs in the routing table known as Default Gateway Address.The routing decisions depend on the following points:The destination IP address and router IP are concealed to decide if the incoming packet Notes is to be forwarded to another network or not. If ... Read More

Distinguish between Connection-Oriented and Connectionless Service

Ginni
Updated on 05-May-2021 10:16:09

6K+ Views

Connection-Oriented ServicesIn a connection-oriented service, each packet is related to a source/destination connection. These packets are routed along a similar path, known as a virtual circuit. Thus, it provides an end-to-end connection to the client for reliable data transfer.It delivers information in order without duplication or missing information. It does not congest the communication channel and the buffer of the receiving device. The host machine requests a connection to interact and closes the connection after the transmission of the data.Mobile communication is an example of a connection-oriented service.Connectionless-ServiceIn connectionless service, a router treats each packet individually. The packets are routed ... Read More

What are the types of Hubs in the Computer Network?

Ginni
Updated on 05-May-2021 10:15:27

4K+ Views

Hub is a unique device used to enhance a network by enabling increased workstations in the network.The three main types of Hubs are as follows−Passive HubPassive hubs do not include any computerized elements, and they do not procedure the data signal at all. The main goal of a passive hub is to connect the signals from various network cable segments. All devices connected to a passive hub take all the packets that develop through the hub.One example of the passive hub is the punch down block consisting of a plastic box with different connectors (mostly RJ 45). This hub is ... Read More

What is BISDN in Computer Network?

Ginni
Updated on 05-May-2021 10:11:31

6K+ Views

The B-ISDN (broadband integrated services digital network) is a virtual circuit-switched network that can use high-speed packet switching services. The B-ISDN will use a flexible multiplexing format called ATM (asynchronous transfer mode).B-ISDN services are classified into interactive and distribution services. Interactive services contain the bidirectional flow of user information between two subscribers or between a subscriber and a service provider.Interactive servicesThe interactive services are further divided into three sub-categories which are as follows−ConversationalConversational service involves the real-time exchange of information such as sound, video, data or entire documents. Examples include video-telephony, video-conference, and high-speed data transfer. Video-telephony is like the ... Read More

What is TCP Connection Release?

Ginni
Updated on 05-May-2021 07:16:05

4K+ Views

A TCP connection is a full-duplex connection. To understand the connection release, we can consider them to be a pair of simplex connections. We can then imagine that each simplex connection is being released independently. Releasing a TCP connection is symmetric. Either port can send a TCP segment with the FIN bit set, meaning it has no more information to send when the FIN is acknowledged that direction is shut down. Still, data can continue to flow continually in the other direction.If a FIN response is not taken within two maximum packet lifetimes, the FIN's sender releases the connection. The ... Read More

Explain the TCP Connection Management

Ginni
Updated on 05-May-2021 07:13:52

22K+ Views

The connection is established in TCP using the three-way handshake as discussed earlier to create a connection. One side, say the server, passively stays for an incoming link by implementing the LISTEN and ACCEPT primitives, either determining a particular other side or nobody in particular.The other side performs a connect primitive specifying the I/O port to which it wants to join. The maximum TCP segment size available, other options are optionally like some private data (example password).The CONNECT primitive transmits a TCP segment with the SYN bit on and the ACK bit off and waits for a response.The sequence of ... Read More

What is the TCP Connection Establishment?

Ginni
Updated on 21-Oct-2023 13:27:33

25K+ Views

To make the transport services reliable, TCP hosts must establish a connection-oriented session with one another. Connection establishment is performed by using the three-way handshake mechanism. A three-way handshake synchronizes both ends of a network by enabling both sides to agree upon original sequence numbers. This mechanism also provides that both sides are ready to transmit data and learn that the other side is available to communicate. This is essential so that packets are not shared or retransmitted during session establishment or after session termination. Each host randomly selects a sequence number used to track bytes within the stream it ... Read More

Advertisements