Tuesday, October 1, 2013
How can firewalls secure a network?
Posted by
Sunflower
at
10/01/2013 07:30:00 AM
0
comments
Labels: Application layer, attacks, Communication, Control, Data, Firewalls, Hardware, Layers, Network, Network layer, Networking, Packets, Protocols, Secure, Security, Software, System, Threats, traffic
![]() | Subscribe by Email |
|
Saturday, September 21, 2013
What are the services provided to upper layers by transport layer?
Posted by
Sunflower
at
9/21/2013 04:01:00 PM
0
comments
Labels: Applications, Communication, Components, Connection oriented, Connection-less, Data, Framework, Interface, Layers, Networking, Operating System, OSI, Protocol, Services, TCP/IP, Transport layer, Upper layers
![]() | Subscribe by Email |
|
Thursday, September 19, 2013
What is fragmentation?
- First
approach: The sender must transmit an IP datagram of size as same as that
of the first hop’s MTU.
- Second
approach: Running the path MTU discovery algorithm.
Posted by
Sunflower
at
9/19/2013 03:41:00 PM
0
comments
Labels: Data, Datagrams, Destination, Fragmentation, Fragments, Host, Hosts, IP, Layers, Messages, Packets, Paths, Protocols, Receiver, Router, Sender, Source, Techniques, transmission, Transport
![]() | Subscribe by Email |
|
Wednesday, September 18, 2013
What are the advantages and disadvantages of datagram approach?
- Datagrams
can contain the full destination address rather than using some number.
- There
is no set up phase required for the datagram circuits. This means that no
resources are consumed.
- If
it happens during a transmission that one router goes down, the datagrams
that will suffer will include only those routers which would have been
queued up in that specific router. The other datagrams will not suffer.
- If
any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
- Datagrams
play an important role in the balancing of the traffic in the subnet. This
is so because halfway the router can be changed.
- Since
the datagrams consist of the full destination address, they generate more
overhead and thus lead to wastage of the bandwidth. This in turn makes
using datagram approach quite costly.
- A
complicated procedure has to be followed for datagram circuits for
determining the destination of the packet.
- In
a subnet using the datagram approach, it is very difficult to keep
congestion problems at bay.
- The
any-to-any communication is one of the key disadvantages of the
datagram subnets. This means that if a system can communicate with any
device, any of the devices can communicate with this system. This can lead
to various security issues.
- Datagram
subnets are prone to losing or re - sequencing the data packets during the
transition. This puts a great burden on the end systems for monitoring,
recovering, and reordering the packets as they were originally.
- Datagram
subnets have less capability of dealing with congestion control as well as
flow control. This happens because the direction of the incoming traffic
is not specified. In the virtual circuit subnets, the flow of the packets
is directed only along the virtual circuits thus making it comparatively
easy for controlling it.
- The
unpredictable nature of the flow of the traffic makes it difficult to
design the datagram networks.
Posted by
Sunflower
at
9/18/2013 05:51:00 PM
0
comments
Labels: Address, Advantages, Connection, Datagrams, Destination, Disadvantages, Information, Layers, Models, Networking, Networks, OSI, Packets, Paths, Route, Router, Routing, Source, Switching, transmission
![]() | Subscribe by Email |
|
Wednesday, September 11, 2013
What are transport and application gateways?
Posted by
Sunflower
at
9/11/2013 10:16:00 PM
0
comments
Labels: Acknowledgement, Application, Application gateways, Code, Connection, Design, Destination, Gateways, Layers, Networks, Ports, Protocols, Request, Server, Source, System, TCP/IP, Transport, Transport gateways
![]() | Subscribe by Email |
|
Tuesday, September 10, 2013
What are the differences between bridges and repeaters?
- LAN
address of the node
- Bridge
interface
- Time
stamp
- Stale
table entries
Posted by
Sunflower
at
9/10/2013 03:20:00 PM
0
comments
Labels: Address, Analog, Bridges, Data, Devices, Differences, Forward, Frames, Hosts, Information, Interface, Layers, Network, Networking, Packets, Physical, Repeaters, Signals, Store, Telecommunications
![]() | Subscribe by Email |
|
Saturday, September 7, 2013
Explain the concept of inter-networking?
- OSI or the open system
interconnection model: This model comes with 7 layer architecture that
covers the hardware and the software interface.
- TCP/ IP model: The
architecture of this model is somewhat loosely defined when compared with
the OSI model.
Posted by
Sunflower
at
9/07/2013 11:06:00 PM
0
comments
Labels: device, Gateways, Hardware, Inter-networking, Interface, Internet, LAN, Layers, Link, Networking, Networks, Packets, Protocols, Route, Router, Routing, Software, Switch, Technology, WAN
![]() | Subscribe by Email |
|
Saturday, August 31, 2013
What is the difference between leaky bucket algorithm and token bucket algorithm?
Posted by
Sunflower
at
8/31/2013 04:10:00 PM
0
comments
Labels: Algorithms, Bandwidth, Bucket, Data, Events, Inter-network, Interfaces, Layers, Leaky bucket algorithm, Network, Network layer, Networking, Packets, Processes, Token, Token bucket algorithm, transmission, Virtual
![]() | Subscribe by Email |
|
Wednesday, August 28, 2013
What are different policies to prevent congestion at different layers?
Posted by
Sunflower
at
8/28/2013 10:09:00 PM
0
comments
Labels: Avoidance, Capacity, Congestion, Congestion control, Control, Efficiency, Layers, Network, Networking, Operation, Parameters, Path, Policies, Prevent, Prevention, Resources, Throughput, traffic, User
![]() | Subscribe by Email |
|