Friday, October 4, 2013
What is a substitution cipher method?
Posted by
Sunflower
at
10/04/2013 08:10:00 PM
0
comments
Labels: Alphabets, Cipher, Cryptography, Encoded, Frequency, Letters, Methods, Process, Protection, Receiver, Secure, Security, Sender, Sequence, Substitution Cipher, System, Text, Types, Units
![]() | Subscribe by Email |
|
Thursday, September 26, 2013
Differentiate between upward and downward multiplexing?
Posted by
Sunflower
at
9/26/2013 02:59:00 AM
0
comments
Labels: Address, Connection, Data, Destination, Downward multiplexing, Links, Multiplexing, Network, Process, Receiver, Segments, Sender, Source, Technique, Transmit, Transport layer, Upward Multiplexing
![]() | Subscribe by Email |
|
Thursday, September 19, 2013
What is fragmentation?
- First
approach: The sender must transmit an IP datagram of size as same as that
of the first hop’s MTU.
- Second
approach: Running the path MTU discovery algorithm.
Posted by
Sunflower
at
9/19/2013 03:41:00 PM
0
comments
Labels: Data, Datagrams, Destination, Fragmentation, Fragments, Host, Hosts, IP, Layers, Messages, Packets, Paths, Protocols, Receiver, Router, Sender, Source, Techniques, transmission, Transport
![]() | Subscribe by Email |
|
Monday, August 26, 2013
What is the difference between congestion control and flow control?
- Congestion control offers such methods that can be used for regulating the incoming traffic in the network to such an extent where the network itself can manage all that.
- In congestion control, the network is prevented from falling in to a state of congestive collapse.
- In such a state either little or no communication happens.
- This little communication is of no help.
- Switching networks usually require congestion control measures than any other type of networks.
- The congestion control is driven by the goal of keeping the number of data packets at such a level that the performance of the network would be reduced dramatically.
- Congestion control mechanism can be seen even in protocols such as UDP (user datagram protocol), TCP (transport control protocol) and other transport layer protocols.
- TCP makes use of the exponential back off and slow start algorithms.
- We classify the congestion control algorithms based up on the feedback that is given by the network, the performance aspect that has to be improved, and modifications that have to be made for the present network, fairness criterion that is being used and so on.
- Congestion and flow control are two very important mechanisms used for keeping the traffic flow in order.
- Flow control is a mechanism that stretches from one end to another i.e., between the sender and the receiver where the speed of sender is much higher than that of the receiving node.
- Congestion control is implemented for preventing packet loss as well as delay that is caused as a side effect of the network congestion.
- Congestion is meant for controlling the traffic of the entire whereas flow control is limited to transmission between two nodes.
Posted by
Sunflower
at
8/26/2013 08:08:00 PM
0
comments
Labels: Communication, Congestion, Congestion control, Control, Data, Differences, Flow, Flow control, Incoming, Information, Mechanism, Networking, Networks, Nodes, Outgoing, Performance, Receiver, Sender, traffic
![]() | Subscribe by Email |
|
Sunday, August 25, 2013
What is the concept of flow control?
- The feedback is sent to the sending node by
the receiving node.
- The feedback is not sent to the sending node
by the receiving node.
Posted by
Sunflower
at
8/25/2013 03:09:00 PM
0
comments
Labels: Acknowledgement, Channels, Communication, Congestion, Control, Data, Defects, Errors, Flow control, Frames, Inefficient, Message, Process, Receiver, Sender, Techniques, transmission
![]() | Subscribe by Email |
|
Saturday, August 24, 2013
Explain multicast routing?
- Receiver
driven tree creation
- Multicast
distribution tree
- IP
multicast group address
- SM
or sparse mode
- DM
or dense mode
- SSM
or source specified mode
- SDM
or sparse – dense mode or bidirectional mode (bidir)
Posted by
Sunflower
at
8/24/2013 12:30:00 AM
0
comments
Labels: Address, Application Development, Communication, Data grams, Destination, Infrastructure, IP, Messages, Multicast Routing, Network, Packets, Protocol, Receiver, Route, Router, Routing, Sender, Source, transmission
![]() | Subscribe by Email |
|
Saturday, August 17, 2013
What is reverse path forwarding?
- The given unicast routing table is converged
as well as correct.
- There is symmetry between the path that goes
from sender to router and the path that comes back from the router to the
sender.
Posted by
Sunflower
at
8/17/2013 06:46:00 PM
0
comments
Labels: Address, Destination, Forward, Interface, IP, Multicast, Network, Networking, Packets, Protocols, Reverse, Reverse Path Forwarding, Route, Routers, Routing, RPF, Sender, Source, Unicast
![]() | Subscribe by Email |
|