Skip to main content

Posts

Showing posts from June, 2016

Difference Between TCP and UDP?

What is the Difference Between TCP and UDP? TCP and UDP are both protocols used to send data over the internet but they do this in a slightly different way. Transmission Control Protocol (TCP) is the most commonly use protocol on the internet. When information is sent as data packets through TCP, your browser will stitch these packets back together to present you, for example, with a web page that you requested. TCP will make sure that the packets are all received and in the right order before it servers you the page so it guarantees delivery. User Datagram Protocol (UDP) on the other hand, will not perform any of the error checking that TCP does making it significantly faster. This is why UDP is better for video streaming or gaming, for example, while TCP is the go-to protocol for your normal browsing. UDP TCP Reliability: UDP is less reliable as it is a connectionless protocol. When you send a message using UDP internet protocol, it is not guaranteed if it will reach the des...

Functions of Data Link Layer

How LLC works

LLC The primary responsibilities of LLC are: Network Layer protocol Multiplexing/De-Multiplexing Interfacing with the Network (Layer3) above by doing L3 protocol multiplexing/de-multiplexing. On receiving a frame from the physical layer below, the LLC is responsible for looking at the L3 Protocol type and handing over the datagram to the correct L3 protocol (de-multiplexing) at the network layer above. On the sending side, LLC takes packets from different L3 protocols like IP, IPX, ARP etc., and hands it over to the MAC layer after filling the L3 protocol type in the LLC header portion of the frame (multiplexing). Logical Link Services LLC can optionally provide reliable frame transmission by the sending node numbering each transmitted frame (sequence number), the receiving node acknowledging each received frame ( acknowledgment number) and the sending node retransmitting lost frames.  It can also optionally provide flow control by allowing the receivers to control the sender...

What is protocol

A protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities. 

Three-Way-Handshake

Definition - What does Three-Way-Handshake mean? A three-way-handshake is a method used in a TCP/IP network to create a connection between a local host/client and server. It is a three-step method that requires both the client and server to exchange SYN and ACK (acknowledgment) packets before actual data communication begins. A three-way-handshake is also known as a TCP handshake. Techopedia explains Three-Way-Handshake A three-way-handshake is primarily used to create a TCP socket connection. It works when:  Upon completion of this process, the connection is created and the host and server can communicate.

Local Area Network Technologies Overview

Local Area Network Technologies Overview Local Area Network ( LAN ) is a data communications network connecting terminals, computers and printers within a building or other geographically limited areas. These devices could be connected through wired cables or wireless links. Ethernet, Token Ring and Wireless LAN using IEEE 802.11 are examples of standard LAN technologies. Ethernet is by far the most commonly used LAN technology. Token Ring technology is still used by some companies. FDDI is sometimes used as a backbone LAN interconnecting Ethernet or Token Ring LANs. WLAN using IEEE 802.11 technologies is rapidly becoming the new leading LAN technology for its mobility and easy to use features. Local Area Network could be interconnected using Wide Area Network (WAN) or Metropolitan Area Network (MAN) technologies. The common WAN technologies include TCP/IP, ATM, Frame Relay etc. The common MAN technologies include SMDS and 10 Gigabit Ethernet. LANs are traditionall...

AAA

Authentication and authorization work together to prevent a multitude of application security attacks. While the basic concepts behind these two methods may be simple, the technology is not. There is a vast array of authentication and authorization techniques available. The articles, tips, definitions and expert advice in this learning guide will help you sort them out.

HYBRID TOPOLOGY

HYBRID TOPOLOGY : " A combination of two or more different topologies makes for a hybrid topology. When different topologies are connected to one another, they do not display characteristics of any one specific topology.  " WORKING OF Hybrid   Topology The Hybrid topology scheme combines multiple topologies into one large topology.The hybrid network is common in large wide area networks. Because each topology has its own strengths and weaknesses, several different types can be combined for maximum effectiveness. ADVANTAGES   of Hybrid Topology Any topology can be combined with another without making any changes to existing topology.  The speed of the topology is compatible because it combines the strengths of each of the topologies, eliminating weaknesses.  It is also more efficient. DISADVANTAGES   of Hybrid Topology Installation and configuration of topology is difficult.  Because there are differe...

MESH TOPOLOGY

MESH TOPOLOGY : "The topology of a network whose components are all connected directly to every other component." WORKING OF Ring   Topology For sending messages, check the cable connected into two devices. A message is send directly from sender to receiver because each one has individual and separate connection. ADVANTAGES   of Mesh Topology Eliminates traffic problems in links sharing. If one link becomes unusable, it does not incapacitate the entire system. Thus, act as robust. It has privacy and security. Point-to-point link make fault identification and fault isolation easy. DISADVANTAGES   of Mesh Topology Difficult to install and maintain. Expenisve.

RING TOPOLOGY

RING TOPOLOGY : "Ring topology looks like the bus topology with connected ends. But In functionality it is different." WORKING OF Ring Topology  Each computer is connected to the next computer in the form of ring. Each retransmit what it receives from the previous computer. The message flow in one direction. Ring topology connects computers on a single circle of cable. There is no terminated ends Signals travel around the loop in one direction and pass through each computer. Unlike bus topology, each computer acts like a repeater to boost the signal and send it to the next computer. It is called endless topology. In ring topology, data flows in ring and in clock-wise direction. Ring topology is based on “Token Ring Mechanism”. Token Passing A token is passed around the network. The computer that has token can transmit data. Token is passed from computer to computer until it reaches to its destination. The destination device returns an acknowled...

Star Topology

Star A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.    Star topology Advantages of a Star Topology Easy to install and wire. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. Disadvantages of a Star Topology Requires more cable length than a linear topology. If the hub, switch, or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the hubs...

Bus Topology

Bus Topology A bus network is an arrangement in a local area network (LAN) in which each node (workstation or other device) is connected to a main cable or link called the bus. The illustration shows a bus network with five nodes. Each node is shown as a sphere, the bus appears as a heavy horizontal line, and connections to the bus appear as vertical lines. A bus network is simple and reliable. If one node fails to operate, all the rest can still communicate with each other. For a major disruption to take place, the bus itself must be broken somewhere. Bus networks are easy to expand. Additional nodes can be added anywhere along the bus. There are several limitations to the bus network topology. The length of the bus is limited by cable loss. A bus network may not work well if the nodes are located at scattered points that do not lie near a common line. In situations like this, a ring network, mesh network, or star network may prove more flexible and mor...

Computer Network

Computer Network A computer network is a set of connected computers. Computers on a network are called nodes . The connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly through radio waves. Connected computers can share resources, like access to the Internet, printers, file servers, and others. A network is a multipurpose connection, which allows a single computer to do more. Types of Network Connections Computer networks can be broken down historically into topologies , which is a technique of connecting computers. The most common topology today is a collapsed ring . This is due to the success of a network protocol called the Ethernet. This protocol, or a network language, supports the Internet, Local Area Networks, and Wide Area Networks. Star Topology A star topology is a design of a network where a central node extends a cable to each computer on the network. On a star network, compute...
A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server

Networking

Networking A network is a group of two or more computer systems linked together. There are many types of computer networks, including the following: local-area networks (LANs): The computers are geographically close together (that is, in the same building). wide-area networks (WANs): The computers are farther apart and are connected by telephone lines or radio waves. campus-area networks (CANs): The computers are within a limited geographic area, such as a campus or military base. metropolitan-area networks MANs): A data network designed for a town or city. home-area networks (HANs): A network contained within a user's home that connects a person's digital devices.