Friday, October 11, 2013
What are advantages and limitations of Wi-Fi?
Posted by
Sunflower
at
10/11/2013 08:25:00 PM
0
comments
Labels: Access Points, Advantages, Communication, Devices, Frequency, Interface, Internet, Limitations, Network, Networking, Physical, Protection, Protocols, Routers, Secure, transmission, Uses, Wifi, Wireless
|
| Subscribe by Email |
|
Tuesday, October 8, 2013
What are uses of Wifi?
Posted by
Sunflower
at
10/08/2013 10:10:00 PM
0
comments
Labels: Access Points, Communication, Devices, Frequency, Interface, Internet, Links, Modes, Network, Networking, Physical, Protection, Protocols, Routers, Secure, transmission, Uses, Wifi, Wireless
|
| Subscribe by Email |
|
Friday, September 27, 2013
What are the parameters of QoS - Quality of Service?
What is Quality of Service?
Posted by
Sunflower
at
9/27/2013 01:48:00 PM
0
comments
Labels: Acceptance, Application, Client, Data, Flexibility, Network, Networking, Operation, Operators, Parameters, Priority, Quality, Quality of Service, Reliability, Services, Specifications, Time, traffic, transmission
|
| Subscribe by Email |
|
Friday, September 20, 2013
Differentiate between transparent and nontransparent fragmentation?
- Transparent
and
- Non
– transparent
Posted by
Sunflower
at
9/20/2013 03:37:00 PM
0
comments
Labels: Assemble, Data, Destination, Differences, Fragmentation, Fragments, Host, Network, Non-transparent, Packets, Performance, Problems, Router, Routing, Size, Source, transmission, Transparent
|
| Subscribe by Email |
|
Thursday, September 19, 2013
What is fragmentation?
- First
approach: The sender must transmit an IP datagram of size as same as that
of the first hop’s MTU.
- Second
approach: Running the path MTU discovery algorithm.
Posted by
Sunflower
at
9/19/2013 03:41:00 PM
0
comments
Labels: Data, Datagrams, Destination, Fragmentation, Fragments, Host, Hosts, IP, Layers, Messages, Packets, Paths, Protocols, Receiver, Router, Sender, Source, Techniques, transmission, Transport
|
| Subscribe by Email |
|
Wednesday, September 18, 2013
What are the advantages and disadvantages of datagram approach?
- Datagrams
can contain the full destination address rather than using some number.
- There
is no set up phase required for the datagram circuits. This means that no
resources are consumed.
- If
it happens during a transmission that one router goes down, the datagrams
that will suffer will include only those routers which would have been
queued up in that specific router. The other datagrams will not suffer.
- If
any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
- Datagrams
play an important role in the balancing of the traffic in the subnet. This
is so because halfway the router can be changed.
- Since
the datagrams consist of the full destination address, they generate more
overhead and thus lead to wastage of the bandwidth. This in turn makes
using datagram approach quite costly.
- A
complicated procedure has to be followed for datagram circuits for
determining the destination of the packet.
- In
a subnet using the datagram approach, it is very difficult to keep
congestion problems at bay.
- The
any-to-any communication is one of the key disadvantages of the
datagram subnets. This means that if a system can communicate with any
device, any of the devices can communicate with this system. This can lead
to various security issues.
- Datagram
subnets are prone to losing or re - sequencing the data packets during the
transition. This puts a great burden on the end systems for monitoring,
recovering, and reordering the packets as they were originally.
- Datagram
subnets have less capability of dealing with congestion control as well as
flow control. This happens because the direction of the incoming traffic
is not specified. In the virtual circuit subnets, the flow of the packets
is directed only along the virtual circuits thus making it comparatively
easy for controlling it.
- The
unpredictable nature of the flow of the traffic makes it difficult to
design the datagram networks.
Posted by
Sunflower
at
9/18/2013 05:51:00 PM
0
comments
Labels: Address, Advantages, Connection, Datagrams, Destination, Disadvantages, Information, Layers, Models, Networking, Networks, OSI, Packets, Paths, Route, Router, Routing, Source, Switching, transmission
|
| Subscribe by Email |
|
Monday, September 2, 2013
Application areas of leaky bucket algorithm and token bucket algorithm
Posted by
Sunflower
at
9/02/2013 01:58:00 PM
0
comments
Labels: Algorithms, Applications, Bandwidth, Congestion, Control, Counter, Events, Interface, Leaky bucket algorithm, Networks, Packets, Queue, Token bucket algorithm, Tokens, traffic, transmission, Users
|
| Subscribe by Email |
|
Saturday, August 31, 2013
What is the difference between leaky bucket algorithm and token bucket algorithm?
Posted by
Sunflower
at
8/31/2013 04:10:00 PM
0
comments
Labels: Algorithms, Bandwidth, Bucket, Data, Events, Inter-network, Interfaces, Layers, Leaky bucket algorithm, Network, Network layer, Networking, Packets, Processes, Token, Token bucket algorithm, transmission, Virtual
|
| Subscribe by Email |
|