Found 78 Articles for Server

H.323 and Associated Protocols

Satish Kumar
Updated on 09-Jan-2023 17:49:23

613 Views

H.323 Protocol Explained H.323 is a set of standards for real-time communication over IP networks, such as the internet. It was developed by the International Telecommunication Union (ITU) in the late 1990s as a way to enable voice, video, and data communication over IP networks. H.323 is a suite of protocols that includes a number of different components, including − H.225 − This protocol is used for signaling, which is the process of establishing and maintaining communication sessions. H.225 uses the Remote Procedure Call (RPC) model to send and receive messages between devices. H.245 − This protocol is used ... Read More

Real Time Streaming Protocol (RTSP)

Satish Kumar
Updated on 09-Jan-2023 15:42:14

4K+ Views

What is Real Time Streaming Protocol (RTSP)? Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communication systems to control streaming media servers. The protocol is used to establish and control media sessions between endpoints, and it can support the transmission of video, audio, and other types of data. RTSP is similar to HTTP, but it is specifically designed for the control of streaming media. It allows a client to issue commands to a server, such as "play, " "pause, " and "record, " and it can also be used to negotiate the ... Read More

Difference between a Server and a Database

Pradeep Kumar
Updated on 05-Jul-2022 12:54:58

11K+ Views

Both "Server" and "Database" are terms from the world of computing that are sometimes mistaken with one another. Virtualization has emerged as a popular choice for large companies, as it enables servers and databases to function as virtual instances. The capabilities of redundancy, backup, and recovery can be found in Databases and Servers alike. They also have the ability to handle the concurrent processing of data by a number of users and possess qualities related to security.What is a Server?The term "server" comes from the world of computing and refers to a piece of computer software or hardware that offers ... Read More

What are the TCP/IP Ports and its applications?

Bhanu Priya
Updated on 24-Mar-2022 13:17:37

8K+ Views

Port is a logical address of any protocol or we can call it a dedicated door for each protocol in which all the packets fall in that box. We can also say that the mailbox for each protocol is a box in which each protocol packet is dropped.Later on the receiver will open that packet and read the content which the sender has sent. Port is a dedicated separate line for packet transmission for each protocol.TCP is called as Transmission control protocol which provides a communication service between an application program and the Internet protocol (IP)A port is a number ... Read More

What are the differences between Non-persistent and p-Persistent CSMA?

Bhanu Priya
Updated on 21-Mar-2022 13:05:57

2K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMAp-persistent CSMAThe p-persistent CSMA is used whenever the channel has time slots so that the time slot duration is equal to or greater than the maximum propagation delay time. The p-persistence senses the channel whenever a station becomes ready to send.Suppose if the channel is busy, then the station has to wait till the next slot is available.The p-persistence transmits with a probability p when the channel is idle. With a probability q=1-p, the station has to wait for the beginning of the ... Read More

What is NBP?

Bhanu Priya
Updated on 21-Mar-2022 12:38:48

280 Views

The Name Binding Protocol (NBP) allows you to bind a name to the internal storage address of the entity and register that mapping so that other entities can follow.An NBP name was displayed by the applications to the users and used addresses internally to locate entities. When we register the entity's name and address, NBP validates its uniqueness.Generally, an entity name consists of three fields, which are as follows −The object − Object field is used to identify the user of the system. Because of the applications this value is set to the owner name, where the user specifies with ... Read More

What is Transport Layer Security (TLS) Handshake?

Bhanu Priya
Updated on 21-Mar-2022 12:33:53

4K+ Views

Transport layer security protocol is one of the security protocols which are designed to facilitate privacy and data security for communications over the Internet. The main use of TLS is to encrypt the communication between web applications and servers, like web browsers loading a website.TLS is used to encrypt other communications like email, messaging, and voice over IP (VoIP). TLS was proposed by the Internet Engineering Task Force (IETF), which is an international standards organization.ComponentsThe three main components that TLS accomplishes are as follows −Encryption − It is used to hide the data being transferred from third parties.Authentication − It ... Read More

What are the types of Virtual LAN (VLAN)?

Bhanu Priya
Updated on 21-Mar-2022 12:29:13

4K+ Views

A VLAN is called a subnetwork that can group together devices on separate physical local area networks. A LAN is a group of computers or devices that share a communications line/wireless link to a server within the same geographical area.VLANs provide security on larger networks by allowing a higher degree of control over which devices have access to each other. They are flexible because VALNs are based on logical connections, rather than physical.Working of VLANWhen a switch receives an Ethernet frame, the frame will either already have a VLAN tag or switch will insert a VLAN tag into the Ethernet ... Read More

What are the types of Transmission Technology?

Bhanu Priya
Updated on 21-Mar-2022 12:31:19

5K+ Views

The transmission technologies are divided into two types −Broadcast networks andPoint-to-point networks.Let us begin by learning about broadcast networks.Broadcast NetworksTransmitting data from one source host to all other hosts present in the same or other network is called broadcast. It is called a one to all transmission.Types of broadcastBroadcast is classified into two types, which are as follows −Limited BroadcastTransmitting data from one source host to all other hosts present in the same network is called a limited broadcast. Given below is the diagram of limited broadcast −In Limited Broad casting if the destination address is 255.255.255.255 then the packet ... Read More

What is Internet Relay Chat (IRC)?

Bhanu Priya
Updated on 21-Mar-2022 12:25:13

3K+ Views

The Internet Relay Chat is a protocol used for live interactive internal text messaging or simultaneous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication messages as well as chat and data transfer including file sharing.IRC is the way of communicating in real time with people from all over the world. IRC has separate networks like IRC servers, machines which allow users to connect to IRC.Working of IRCGenerally, the user runs a program to connect to a server on one of the IPC nets.The server relays information to and forms other ... Read More

Advertisements