OSI protocols

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 3 of 25 - About 242 Essays
  • Great Essays

    Nt1310 Unit 9

    • 1390 Words
    • 6 Pages

    UML 91.561 Computer & Network Security I HomeWork 1 Name – Nrupen Abnave Student ID -01382247 1.1 (a) Describe the major structure of a TCP packet and explain the main functions of the TCP headers. - TCP is a transport layer protocol and is connection oriented. Its reliable connection, has error checking and flow control. TCP Headers: 32bits Source and Destination Ports – Each 16bit number. Indicate which application is using the communicating stream. Used by most common…

    • 1390 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Assignment 1

    • 432 Words
    • 2 Pages

    latencies due to TCP connection structure. HTTP only transfers larger amount of data, and needs a genuine mechanism. DNS requests are short packets that issues the IP address for a name and maybe some other dependable name server addresses. The reliable protocol semantics of TCP would be costly in the DNS case. b) What could happen in DNS if its UDP based request or response packet is lost If DNS request packet are lost, the resolver would devote that there is a short-term failure in name…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Network Networks

    • 1368 Words
    • 6 Pages

    variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology. Different cables have different characteristics and it is important to learn about the different cables available on a network to develop a successful network. In this report I will be discussing and…

    • 1368 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel. Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Design Analysis A connection is recognized in the optical layer regulates to carry the information among the clients in the network. The optical connection is preserved between a source node, s and destination node, d is known as an light path. The problem in finding a route for a light path with wavelength assigned to the light path is submitted as the routing and wavelength assignment problem (RWA). The problem of RWA is divided into two parts : Routing and Wavelength Assignment. In the…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The Importance Of Firewall

    • 1169 Words
    • 5 Pages

    implements an access control policy among two networks. Example: “Allows: http, mails etc. Keeps out: intruders, denial of services attacks etc.” 1.10.1 Firewall work: The protocol that computers use to be in touch on the internet is called TCP/IP. Each computer on the Internet has a only one of its kind internet protocol and each computer has a run of ports used to be in touch with other computers “Ex: http (web pages) – port 80 FTP (file) – port 21” 1.10.2 Need of firewall: We…

    • 1169 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    An IP address, or internet protocol address, identifies a person online by where they are in the world and more specifically, acts as that individual’s online identity (IP Address). However, these advertisements that companies show only reflect what a person has left traces of online…

    • 759 Words
    • 4 Pages
    Improved Essays
  • Page 1 2 3 4 5 6 7 8 9 25