Wednesday, October 2, 2013
What is link encryption method?
Posted by
Sunflower
at
10/02/2013 07:00:00 AM
0
comments
Labels: Application, Communication, Cost, Data, digital, Encrypt, Encryption, Information, Link Encryption Method, Method, Objectives, Protection, Safety, Security, System, traffic, Users
![]() | Subscribe by Email |
|
Monday, September 30, 2013
What are the security problems faced by a network?
Posted by
Sunflower
at
9/30/2013 03:16:00 PM
0
comments
Labels: Administrator, Attack, Data, Encryption, Network, Networking, Passwords, Prevention, Problems, Protection, Risk, Secure, Security, Server, Software, System, Technology, Threats, Users, Web
![]() | Subscribe by Email |
|
Monday, September 23, 2013
What is meant by Quality of Service provided by network layer?
Posted by
Sunflower
at
9/23/2013 10:37:00 PM
0
comments
Labels: Applications, Communication, Frequency, Networks, Packets, Parameters, Protocols, QOS, Quality, Quality of Service, Requirements, Services, Signals, Switch, Telecommunication, traffic, Users
![]() | Subscribe by Email |
|
Saturday, September 14, 2013
Explain Border Gateway Protocol (BGP)?
Posted by
Sunflower
at
9/14/2013 08:57:00 AM
0
comments
Labels: BGP, Border gateway protocol, Domain, Exterior, Gateway, Interior, Internet, Messages, Network, Networking, Policies, Process, Protocol, Reach-ability, Route, Routing, Rules, System, Users, Uses
![]() | Subscribe by Email |
|
Wednesday, September 11, 2013
What are multi-protocol routers?
- It requires additional
knowledge because you cannot master everything. For individual protocol an
expert is required who in case of a failure can diagnose it and fix it.
- It puts extra load on the
routers. For every protocol, the router would have to maintain a separate routing
table. This calls for a dynamic routing protocol for the router itself.
For all this, more memory is required along with high processing power.
- It increases the complexity.
Multi-protocol router even though it seems to be simple, it is quite a
complicated thing in terms of both hardware and software. Any problem in
the implementation of the protocol can have a negative impact up on the stability
of all the protocols.
- Difficulty in designing: There
are separate rules for routing of each protocol, assignment of the
addresses and so on. There are possibilities that there might be conflicts
between these rules which means it is very difficult to design.
- It decreases stability.
Scaling capacity of certain protocols is not as good as of the others. Some
of the protocols are not suited to work in a WAN environment.
Posted by
Sunflower
at
9/11/2013 04:00:00 AM
0
comments
Labels: Destination, Dynamic, Flexible, Information, Multi-protocol Routers, Networking, Networks, Packets, Protocols, Route, Routers, Routing, Server, Sharing, Source, subnet, Tasks, Users
![]() | Subscribe by Email |
|
Monday, September 2, 2013
Application areas of leaky bucket algorithm and token bucket algorithm
Posted by
Sunflower
at
9/02/2013 01:58:00 PM
0
comments
Labels: Algorithms, Applications, Bandwidth, Congestion, Control, Counter, Events, Interface, Leaky bucket algorithm, Networks, Packets, Queue, Token bucket algorithm, Tokens, traffic, transmission, Users
![]() | Subscribe by Email |
|
Friday, August 30, 2013
What is meant by flow specification?
Posted by
Sunflower
at
8/30/2013 01:24:00 PM
0
comments
Labels: Acknowledgement, Actions, Address, Application, Category, Destination, Dynamic, Filter, Flow, Flow Specification, Ports, Routers, Security, Source, Specifications, Static, traffic, transmission, Users
![]() | Subscribe by Email |
|