mention the funtions about connection oriented and
connectionless protocol and how it works ?
Answers were Sorted based on User's Feedback
Answer / bhisham kumar
connectionless protocols are the protocols that provided
connectionless service in a network fro e.g UDP provide
connectionless sevices in data link layer in which data
loss more
A connection oriented protocols are those provided by the
data link layer in TCP in which first connection
established then data transfer after getting the reply from
the another end good as compare to the connection less
protocols
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / neeru sharma
Connectionless protocols are the protocols that enable
connectionless services in a network. The internet Protcol
(IP) and UDP
A connection-oriented networking protocol is one that
delivers a stream of data in the same order as it was sent,
after first establishing a communication .TCP/IP
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / jeevi
connection oriented:
1. Tcp is a connection oriented protocol
2.reliable network service 3.it is guaranted to deliver the
data 4.packets should follow the same path,loss of data does
not occur.
connection less:
1.UDP is connection less
2.unreliable service 3.it is not guaranted to deliver the data
4.packets do not need to arrive in specific order
5.loss of data occurs.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
TCP is a Connection Oriented Protocol and UDP is a
Connectionless protocol.TCP is a Non Reliable where as UDP
is a relaiable .UDP is fast when compared to TCP as UDP is
a Connectionless protocol.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / shashikant sharma
In connection-oriented protocols, corresponding entities
maintain state information about the dialogue they are
engaged in. This connection state information supports
error, sequence and flow control between the corresponding
entities. The windowing scheme presented earlier is an
example of a connection-oriented protocol.
Error control refers to a combination of error detection
(and correction) and acknowledgment sufficient to
compensate for any unreliability inherent to the channel.
Sequence control refers to the ability for each entity to
reconstruct a received series of messages in the proper
order in which they were intended to be received; this is
essential to being able to transmit large files across
dynamically-routed mesh networks. Flow control refers to
the ability for both parties in a dialogue to avoid
overrunning their peer with too many messages.
Connection-oriented protocols operate in three phases. The
first phase is the connection setup phase, during which the
corresponding entities establish the connection and
negotiate the parameters defining the connection. The
second phase is the data transfer phase, during which the
corresponding entities exchange messages under the auspices
of the connection. Finally, the connection release phase is
when the correspondents "tear down" the connection because
it is no longer needed.
An everyday example of a connection-oriented protocol is a
telephone call. The call originator must first "dial" the
destination phone number. The telephony infrastructure must
setup the end-to-end circuit, then "power ring" the call
terminator. From this point on, the connection is in place
until one of the parties hangs up. Once the called party
answers the phone, another level of connection (between
people) must be established before real messages can be
exchanged.
Connectionless protocols differ markedly from connection-
oriented protocols in that they do not provide the
capability for error, sequence and flow control. Nor do
they have any connection state maintenance requirement.
Each message is considered to be independent of all others
in a connectionless protocol. Whether or not a given
message is received correctly and when has no bearing on
other messages; somehow the destination must sort things
out and make sense of it all.
Connectionless protocols are always in the data transfer
phase, with no explicit setup or release phases as in
connection-oriented protocols.
| Is This Answer Correct ? | 0 Yes | 0 No |
Which protocols are link states?
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises
Identify the 2 characteristics that TCP and UDP share in common? A.) Both use port numbers to identify upper level applications B.) Operate at the Network layer C.) Both are Transport protocols D.) Both are reliable communications
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
When discussing static routes, what is the gateway parameter used for? A.) Determining the dynamic route B.) Defining the subnet C.) Defining the Administrative Distance D.) Determining the next hop
take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
Define load balancing?
On which base distance vector choose best path?
What is the size of an ip address?
Identify the command to display the configured IP routing protocols? A.) show protocols B.) show protocols all C.) show routing-protocols D.) show ip protocols
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch
What is the difference between an igp and an egp?