Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual messages from one computer to another. However, these messages might be lost or can arrive out of order.
Why would someone want to use such a protocol? One example application might be video streaming, in which we don't care that much if a packet was lost, and if the video has kept playing, we're not going to go back and show an old frame which has arrived late. While UDP has its place for some speci?c applications, by far the most used transport protocol is TCP (Transmission Control Protocol). TCP provides a connection with reliable, in-order delivery of a
stream of bytes, so the application programmer doesn't have to worry very much about dropped packets, packets which arrive out of order, or the details of network message boundaries. Notice that maybe the most important feature provided by transport protocols is the possibility of performing process-to-process communication. This capability means that not only can we send messages from one machine to another, but from a speci?c process in the origin machine to a speci?c process in the destination machine. In addition to the IP addresses, we also use the port numbers, which are endpoint sub-addresses, visible to the application layer. If we think of IP addresses as analogous to "building numbers", we can interpret ports as analogous to "apartment numbers".
network diagram which must include at least 2router,2bridge and 4 switches and must have different protocols and different cable...?
List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring
Retransmission of packets The disadvantage of thronging away a correctly received packet is that the subsequent retransmission of the packet might be lost or garbled and
What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.
Q. What is an Error? At any time bits flow from one point to another they are subject to unpredictable changes because of interference The interference is able to change the
What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and corrected. Error Detection uses
Write the characteristic of Store and Forward switches? A) Store and Forward switch will not forward fragments. B) The longer the frame, the longer the delay (latenc
Question 1: Describe the following terms in your own words: a. Internet b. WWW c. Intranet
three types of network criteria
What is Remote Procedure Call (RPC)? RPC hides the intricacies of the network by using the ordinary process call mechanism familiar to every programmer. A client process calls
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd