Thursday, September 26, 2013
Differentiate between upward and downward multiplexing?
Posted by
Sunflower
at
9/26/2013 02:59:00 AM
0
comments
Labels: Address, Connection, Data, Destination, Downward multiplexing, Links, Multiplexing, Network, Process, Receiver, Segments, Sender, Source, Technique, Transmit, Transport layer, Upward Multiplexing
![]() | Subscribe by Email |
|
Friday, September 20, 2013
Differentiate between transparent and nontransparent fragmentation?
- Transparent
and
- Non
– transparent
Posted by
Sunflower
at
9/20/2013 03:37:00 PM
0
comments
Labels: Assemble, Data, Destination, Differences, Fragmentation, Fragments, Host, Network, Non-transparent, Packets, Performance, Problems, Router, Routing, Size, Source, transmission, Transparent
![]() | Subscribe by Email |
|
Thursday, September 19, 2013
What is fragmentation?
- First
approach: The sender must transmit an IP datagram of size as same as that
of the first hop’s MTU.
- Second
approach: Running the path MTU discovery algorithm.
Posted by
Sunflower
at
9/19/2013 03:41:00 PM
0
comments
Labels: Data, Datagrams, Destination, Fragmentation, Fragments, Host, Hosts, IP, Layers, Messages, Packets, Paths, Protocols, Receiver, Router, Sender, Source, Techniques, transmission, Transport
![]() | Subscribe by Email |
|
Wednesday, September 18, 2013
What are the advantages and disadvantages of datagram approach?
- Datagrams
can contain the full destination address rather than using some number.
- There
is no set up phase required for the datagram circuits. This means that no
resources are consumed.
- If
it happens during a transmission that one router goes down, the datagrams
that will suffer will include only those routers which would have been
queued up in that specific router. The other datagrams will not suffer.
- If
any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
- Datagrams
play an important role in the balancing of the traffic in the subnet. This
is so because halfway the router can be changed.
- Since
the datagrams consist of the full destination address, they generate more
overhead and thus lead to wastage of the bandwidth. This in turn makes
using datagram approach quite costly.
- A
complicated procedure has to be followed for datagram circuits for
determining the destination of the packet.
- In
a subnet using the datagram approach, it is very difficult to keep
congestion problems at bay.
- The
any-to-any communication is one of the key disadvantages of the
datagram subnets. This means that if a system can communicate with any
device, any of the devices can communicate with this system. This can lead
to various security issues.
- Datagram
subnets are prone to losing or re - sequencing the data packets during the
transition. This puts a great burden on the end systems for monitoring,
recovering, and reordering the packets as they were originally.
- Datagram
subnets have less capability of dealing with congestion control as well as
flow control. This happens because the direction of the incoming traffic
is not specified. In the virtual circuit subnets, the flow of the packets
is directed only along the virtual circuits thus making it comparatively
easy for controlling it.
- The
unpredictable nature of the flow of the traffic makes it difficult to
design the datagram networks.
Posted by
Sunflower
at
9/18/2013 05:51:00 PM
0
comments
Labels: Address, Advantages, Connection, Datagrams, Destination, Disadvantages, Information, Layers, Models, Networking, Networks, OSI, Packets, Paths, Route, Router, Routing, Source, Switching, transmission
![]() | Subscribe by Email |
|
Wednesday, September 11, 2013
What are transport and application gateways?
Posted by
Sunflower
at
9/11/2013 10:16:00 PM
0
comments
Labels: Acknowledgement, Application, Application gateways, Code, Connection, Design, Destination, Gateways, Layers, Networks, Ports, Protocols, Request, Server, Source, System, TCP/IP, Transport, Transport gateways
![]() | Subscribe by Email |
|
What are multi-protocol routers?
- It requires additional
knowledge because you cannot master everything. For individual protocol an
expert is required who in case of a failure can diagnose it and fix it.
- It puts extra load on the
routers. For every protocol, the router would have to maintain a separate routing
table. This calls for a dynamic routing protocol for the router itself.
For all this, more memory is required along with high processing power.
- It increases the complexity.
Multi-protocol router even though it seems to be simple, it is quite a
complicated thing in terms of both hardware and software. Any problem in
the implementation of the protocol can have a negative impact up on the stability
of all the protocols.
- Difficulty in designing: There
are separate rules for routing of each protocol, assignment of the
addresses and so on. There are possibilities that there might be conflicts
between these rules which means it is very difficult to design.
- It decreases stability.
Scaling capacity of certain protocols is not as good as of the others. Some
of the protocols are not suited to work in a WAN environment.
Posted by
Sunflower
at
9/11/2013 04:00:00 AM
0
comments
Labels: Destination, Dynamic, Flexible, Information, Multi-protocol Routers, Networking, Networks, Packets, Protocols, Route, Routers, Routing, Server, Sharing, Source, subnet, Tasks, Users
![]() | Subscribe by Email |
|
Wednesday, September 4, 2013
What is a choke packet?
Posted by
Sunflower
at
9/04/2013 04:00:00 PM
0
comments
Labels: Address, Advantages, Choke Packets, Congestion, Data, Destination, Disadvantages, Flow control, Networks, Nodes, Packets, Problem, Quality, Queues, Router, Source, traffic, Transmitter
![]() | Subscribe by Email |
|
Tuesday, September 3, 2013
What is meant by load shedding?
Posted by
Sunflower
at
9/03/2013 02:17:00 PM
0
comments
Labels: CPU, Destination, Features, Load, Load Shedding, Monitor, Network, Overload, Packets, Phases, Plug-ins, Reduce, Resources, Robust, Source, Stress, Subsystem, System, Technique, traffic
![]() | Subscribe by Email |
|