TCP/IP model questions based Study Material for gate Computer Science - 0 views
-
computersciencej on 17 Nov 17TCP/IP protocol based questions for gate computer science exam Q1.What is the difference between transport and session layer of OSI model. Answer: OSI Model Transport Layer The transport layer uses the services provided by the network layer, such as best path selection and logical addressing, to provide end-to-end communication between source and destination. The transport -layer data stream is a logical connection between the endpoints of a network. End-to-end control is provided by sliding windows and reliability in sequencing numbers and acknowledgments. The transport layer regulates information flow to ensure end-to-end connectivity between host applications reliably and accurately. The TCP/ IP protocol of Layer 4 (t transport t layer ) has two protocols. They are TCP and UDP. The transport layer accepts data from the session layer and segments the data for transport across the network. Generally, the transport layer is responsible for making sure that the data is delivered error-free and in the proper sequence. Flow control generally occurs at the transport layer. OSI Model Session Layer The session layer establishes, manages, and terminates communication sessions. Communication sessions consist of service requests and service responses that occur between applications located on different network devices. These requests and responses are coordinated by protocols implemented at the session layer. The session layer establishes, manages, and terminates sessions between applications Functions of the session layer and the different processes that occur as data packets travel through this layer. More specifically, you learned that Communication sessions consist of mini-conversations that occur between applications located on different network devices. Requests and responses are coordinated by protocols implemented at the session layer. The session layer decides whether to use two-way simultaneous communication or two-way alternate communicati
Introduction to Network Security - 0 views
A Million Dollar Request for Social Networks | Blockstack - 0 views
-
"It's time for a new breed of social networks - where power is taken back from a single authority and control is returned to you, to me, to all of us. It's time to decentralize social networks. This is a movement toward greater personal freedom, but it takes an empowered community to build this future."
BabelNet | The largest multilingual encyclopedic dictionary and semantic network - 0 views
-
"BabelNet is both a multilingual encyclopedic dictionary, with lexicographic and encyclopedic coverage of terms, and a semantic network which connects concepts and named entities in a very large network of semantic relations, made up of about 15 million entries, called Babel synsets. Each Babel synset represents a given meaning and contains all the synonyms which express that meaning in a range of different languages. Its evolution, BabelNet live, is a new, continuously growing resource, .."
Voice over Internet Protocol - Wikipedia, the free encyclopedia - 0 views
-
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched network
-
Internet telephony refers to communications services—voice, facsimile, and/or voice-messaging applications—that are transported via the Internet, rather than the public switched telephone network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet; the process is reversed at the receiving end.[1]
Routing Table Based Study Material for gate Computer Science - 0 views
-
In our previous post Routing Concepts in Computer Networks we have explained the basic introduction of the routing concept. In the continuation of that post now in this article of Computer Science Study Material for Gate, we are going to tell about routing table. In this article provides the information about the different fields of a routing table with a suitable example, what is the use of these fields and how a particular route is selected for the destination host. So let's start with the introduction of routing table. http://www.computersciencejunction.in/2017/12/Study-Material-for-Gate-Computer-Science-routing-table-in-computer-network.html
Quantum Network Explorer - 0 views
Blockstack - The New Decentralized Internet - 0 views
-
'Blockstack is an open-source project and a decentralized network. For the past years, one company, Blockstack Inc, has taken the lead on protocol development. We plan to have many independent individuals and companies operating on the network and taking on greater roles in the protocol's development. We will release more details on governance structures and potential independent entities that can provide a degree of neutrality and balance to the protocol development in the long run.'
VIVO | connect - share - discover - 0 views
I2P Anonymous Network - 0 views
Netwokring Introduction - 0 views
-
Networking Tutorial
Colocation Hosting Services - 0 views
-
Colocation allows you to place your server machine in someone else's rack and share their bandwidth as your own.Choosing the colocation hosting services from Rackbank Datacenter is a beneficial and a cost effective option for businesses that need a stable and high performance network while maintaining total control over hardware and server administration.
Database - Wikipedia, the free encyclopedia - 0 views
-
A database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships
-
increase their speed
-
common kind of index is a sorted list of the contents of some particular table column, with pointers to the row associated with the value
- ...1 more annotation...
List of network protocols - Wikipedia, the free encyclopedia - 0 views
-
IPv4 Internet Protocol version 4
-
IPv6 Internet Protocol version 6
-
المفروض ده بقي البروتوكول الجديد الي إن شاء الله هيطبق بعيدن
-
Currently there are two types of Internet Protocol (IP) addresses in active use: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was initially deployed on 1 January 1983 and is still the most commonly used version. IPv4 addresses are 32-bit numbers often expressed as 4 octets in "dotted decimal" notation (for example, 192.0.2.53). Deployment of the IPv6 protocol began in 1999. IPv6 addresses are 128-bit numbers and are conventionally expressed using hexadecimal strings (for example, 2001:0db8:582:ae33::29). source : http://www.iana.org/numbers/ thanks tecno for your useful comments :) keep it up(Y)
-
-
TCP Transmission Control Protocol UDP User Datagram Protocol
-
The Diffrance between TCP and UDP is that TCP check the packet that packets are sent correctly ... but UDP just send and don't check ....so UDP is faster than TCP but TCP check that data is sent correctly .... so UDP is used in applications like Video Streaming (You Tube) and Voice Streaming too
-
check this http://www.skullbox.net/tcpudp.php
-
- ...6 more annotations...