mention the funtions about connection oriented and
connectionless protocol and how it works ?

Answers were Sorted based on User's Feedback



mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / bhisham kumar

connectionless protocols are the protocols that provided
connectionless service in a network fro e.g UDP provide
connectionless sevices in data link layer in which data
loss more


A connection oriented protocols are those provided by the
data link layer in TCP in which first connection
established then data transfer after getting the reply from
the another end good as compare to the connection less
protocols

Is This Answer Correct ?    5 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / neeru sharma

Connectionless protocols are the protocols that enable
connectionless services in a network. The internet Protcol
(IP) and UDP
A connection-oriented networking protocol is one that
delivers a stream of data in the same order as it was sent,
after first establishing a communication .TCP/IP

Is This Answer Correct ?    4 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / jeevi

connection oriented:
1. Tcp is a connection oriented protocol
2.reliable network service 3.it is guaranted to deliver the
data 4.packets should follow the same path,loss of data does
not occur.

connection less:
1.UDP is connection less
2.unreliable service 3.it is not guaranted to deliver the data
4.packets do not need to arrive in specific order
5.loss of data occurs.

Is This Answer Correct ?    4 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / s.m.feroz ahmed

Hi,

TCP is a Connection Oriented Protocol and UDP is a
Connectionless protocol.TCP is a Non Reliable where as UDP
is a relaiable .UDP is fast when compared to TCP as UDP is
a Connectionless protocol.

Is This Answer Correct ?    1 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / salman

tcp and udp

Is This Answer Correct ?    0 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / shashikant sharma

In connection-oriented protocols, corresponding entities
maintain state information about the dialogue they are
engaged in. This connection state information supports
error, sequence and flow control between the corresponding
entities. The windowing scheme presented earlier is an
example of a connection-oriented protocol.

Error control refers to a combination of error detection
(and correction) and acknowledgment sufficient to
compensate for any unreliability inherent to the channel.
Sequence control refers to the ability for each entity to
reconstruct a received series of messages in the proper
order in which they were intended to be received; this is
essential to being able to transmit large files across
dynamically-routed mesh networks. Flow control refers to
the ability for both parties in a dialogue to avoid
overrunning their peer with too many messages.

Connection-oriented protocols operate in three phases. The
first phase is the connection setup phase, during which the
corresponding entities establish the connection and
negotiate the parameters defining the connection. The
second phase is the data transfer phase, during which the
corresponding entities exchange messages under the auspices
of the connection. Finally, the connection release phase is
when the correspondents "tear down" the connection because
it is no longer needed.

An everyday example of a connection-oriented protocol is a
telephone call. The call originator must first "dial" the
destination phone number. The telephony infrastructure must
setup the end-to-end circuit, then "power ring" the call
terminator. From this point on, the connection is in place
until one of the parties hangs up. Once the called party
answers the phone, another level of connection (between
people) must be established before real messages can be
exchanged.

Connectionless protocols differ markedly from connection-
oriented protocols in that they do not provide the
capability for error, sequence and flow control. Nor do
they have any connection state maintenance requirement.
Each message is considered to be independent of all others
in a connectionless protocol. Whether or not a given
message is received correctly and when has no bearing on
other messages; somehow the destination must sort things
out and make sense of it all.
Connectionless protocols are always in the data transfer
phase, with no explicit setup or release phases as in
connection-oriented protocols.

Is This Answer Correct ?    0 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / bhisham kumar

sry work on the transport layer

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace

2 Answers  


CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office

1 Answers  


Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities

0 Answers   Infosys,


Which command loads a new version of the Cisco IOS into a router? A. copy flash ftp B. copy ftp flash C. copy flash ftp D. copy tftp flash

2 Answers  


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable

1 Answers   Google,






In the setup dialog, what do the square brackets indicate? A. current or default spores B. hard coded values that cannot be modified C. values entered by the administrator but not saved D. values that must be written to NVRAM before becoming enabled

1 Answers  


Identify the components in the following command 'interface serial0/1/1' A.) Serial interface, port number 0, slot 1, port adapter 1 B.) Serial interface, slot 1, port number 1, port adapter 0 C.) Serial interface, slot 0, port adapter 1, port number 1

1 Answers  


What is the function of Layer 2 Device?

3 Answers  


Name the vtp modes?

0 Answers  


What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 Answers  


Your network is having IP problems connecting to one or more Frame Relay peer routers. Which two commmands should you use to show the routers that are reachable? (Choose two) A. show ip map B. show ip router C. show frame-relay map D. debug frame-relay map

1 Answers  


LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server

1 Answers  


Categories