bit
1 answer
Different from a connectionless protocol, a connection-oriented protocol guaranties the delivery of the information. An example of connection-oriented protocol is (TCP) and a connectionless protocol is (UDP). TCP is a connection-oriented protocol, it makes a connection and checks whether the data is received, and resends if it is not. UDP is a connectionless protocol, it does not guarantee delivery by first connecting and checking whether data is received.
1 answer
TCP is the protocol of network layer, It is connection oriented protocol. UDP is the protocol of network layer, It is connection less protocol.
1 answer
DHCP is a connectionless protocols.
In general, any protocol that is based on TCP port alone is a connection-oriented protocol while any protocol that is based on UDP port alone is a connectionless protocol.
And a protocols that can work on both TCP and UDP port can be either a connection-oriented or a connectionless protocol depending upon the which protocol is used (TCP or UDP).
For checking other protocols if they are connection-oriented or connectionless check
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
3 answers
Transmission Control Protocol (TCP) is used when data reliability is needed since it is connection oriented and guarantees delivery.
1 answer
Email runs SMTP (simple mail transfer protocol), where SMTP operates over TCP protocol, so it id connection oriented.
1 answer
Simple mail transfer protocol Incorrect it is TCP
1 answer
Connection-oriented protocol
1 answer
Different from a connectionless protocol, a connection-oriented protocol guaranties the delivery of the information. An example of connection-oriented protocol is (TCP) and a connectionless protocol is (UDP). page/926 A+
2 answers
Connection oriented is more reliable because there is an acknowledgment received from data receiver (destination) that the data is receiving and transfer is successful which is not received from connection less protocol.
1 answer
In bit oriented Protocol, a flag is used to frame the bits sent. Simply put, you have a fllag (01111110) and the required bits are sent after the flag and you end the transmission again with a flag. Using this method you can send any number of bits of any length. Another important fact is the zero insertion method used. Say for example, you want to send the bit string 01111110. You cannot do this because it will be interpreted as a flag. However, by adding a zero after 5 consecutive 1's as a standard, this bit stream can be send. The transmitter sends the string as 011111010 and the receiver removes the zero after 5 consecutive 1's and stores the data as 01111110
In byte oriented protocol(character oriented protocol) the receiver considers 8 bits at a time and figuers out the relevant character. This system is used when communicating with printers and keyboards which use ASCII characters exclusively. (All the ASCII characters can be covered by 8 bits (256 characters). The main disadvantade of COP is that you cannot send 9 or 10 bits, arbitrary bits. Furthermore, in COP there are special characters - channel control characters, eg- SYN character which is used to synchronize the receiver and the transmitter. These characters cannot be transferred as data. They will be misread as control characters.
1 answer
A reliable data transfer is one that is stable . For a reliable data transfer a connection oriented protocol is used. A connection oriented protocol is one that receives acknowledgement from the receiver before sending the further data.
1 answer
Telnet is similar to HTTP and FTP in that all three use the TCP protocol for connection-oriented
1 answer
The networking protocol that uses a 32-bit address is an IP (Internet Protocol).
1 answer
In bit oriented Protocol, a flag is used to frame the bits sent. Simply put, you have a fllag (01111110) and the required bits are sent after the flag and you end the transmission again with a flag. Using this method you can send any number of bits of any length. Another important fact is the zero insertion method used. Say for example, you want to send the bit string 01111110. You cannot do this because it will be interpreted as a flag. However, by adding a zero after 5 consecutive 1's as a standard, this bit stream can be send. The transmitter sends the string as 011111010 and the receiver removes the zero after 5 consecutive 1's and stores the data as 01111110
In byte oriented protocol(character oriented protocol) the receiver considers 8 bits at a time and figuers out the relevant character. This system is used when communicating with printers and keyboards which use ASCII characters exclusively. (All the ASCII characters can be covered by 8 bits (256 characters). The main disadvantade of COP is that you cannot send 9 or 10 bits, arbitrary bits. Furthermore, in COP there are special characters - channel control characters, eg- SYN character which is used to synchronize the receiver and the transmitter. These characters cannot be transferred as data. They will be misread as control characters.
2 answers
connectionless protocols. A connection less protocol's lack of sophistication makes it more efficient than a connection-oriented protocol and renders it useful in situations in which data must be transferred quickly
2 answers
tcp based protocols,internet protocol,sometimes file transfer protocol also supported by tcp wrappers. tcp is reliable and connection oriented.
1 answer
an upper-layer, connection-oriented protocol or service
1 answer
its depend on which protocol used in transport layer
1 answer
The transmission control protocol or TCP is used for connection oriented transmissions of data into a computer. The user datagram protocol or UDP is used to transmit simpler data into a computer.
1 answer
A datagram socket represents a connectionless, non-guaranteed communication protocol. It represents the UDP protocol in the TCP/IP suite.
Contrast this with a stream socket, which represents a connection oriented, guaranteed, communication protocol. It represents the TCP protocol in the TCP/IP suite.
UDP is the underlying protocol for TCP. If you are talking OSI model, UDP is layer 3, and TCP is layer 4.
1 answer
There are actually two different GTP protocols.
GTP (Go Text Protocol) is basically an application layer protocol, although the definition is a bit fuzzy.
GTP (GPRS Tunneling Protocol) is a transport layer protocol that is used in conjunction with another transport layer protocol (TCP or UDP).
1 answer
Because UDP does not use handshaking, connection-oriented transmission, and is thus much faster.
1 answer
breaks large amounts of data into packets of a fixed size, transmits the packets over the Internet using the Internet protocol (IP), and sequentially numbers them to allow reassembly at the recipient's end.
3 answers
start bit signals receiver end to receive sequence of bits(data bits) and stop bit to signal the end of bit transmission.
1 answer
Two distinct techniques are used in data communications to transfer data. Each has its own advantages and disadvantages. They are the connection-oriented method and the connectionless method:
10 answers
TCP is known as a connection-oriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged.that connection is virtual only...
1 answer
flow control
low overhead
connectionless
connection-oriented
sequence and acknowledgements
2 answers
One of the benefits of web applications is that they are generally transported via TCP, which is a connection-oriented protocol designed to assure delivery.
1 answer
3 bit stuffing is required
1 answer
tcp is the transport layer of protocol this is also known as port ports have 16 bits
1 answer
IPv4 is an abbreviation for Internet Protocol version 4, which is a 32 bit addressing method.
IPv6 is an abbreviation for Internet Protocol version 6, which uses 128 bits.
1 answer
Olaf Zimmermann has written:
'Perspectives on web services' -- subject(s): Internet programming, Object-oriented programming (Computer science), Simple Object Access Protocol (Computer network protocol), Web services, Web site development
1 answer
First let me explain the difference between connection oriented and connectioinless oriented. We'll use you as an example, Lets say you want to send an email to your friend in Australia. You need a system called a protocol to set up your system before you send the message. First a connection has to be made with your buddies Internet supplier, then once the connection is made you can send your email, then you want to make sure he got your email and then you want to end the session so someone else can use the system. On a connection protocol, the protocol first establishes a connection, then waits for a signal from the receiver to make sure the system is clear, then the data is sent, then it waits for a signal to say the data was received, then the session is closed. On a connectionless protocol, the session is established, the data is sent, and then the session is closed. So there is no confirmation if the data was received. That is what connectionless means, Netware uses a Transport protocol called IPX which is a connectionless protocol. So that is where the name came from.
1 answer
Upgrade to the LEAP wireless security protocol.
1 answer
Character-oriented protocols are also known as byte oriented protocols. They are used in variable size framing by the Data link layer for data link control.
Data are 8-bit characters encoded in ASCII. Along with the header and the trailer, 2 flags are included in each frame (beginning and end of frame) to separate it from other frames. These flags are protocol dependent characters.
The important issue is how to differentiate when the data in the frame is the same as the flag? This means that how is the Receiver going to know that the frame content is actually the data not the flag?
A solution is to use a process called BYTE STUFFING. An extra byte is added to the data section of the frame, where the character sequence is the same as the flag. This is usually the escape character: ESC.
Of course if the data section also includes same sequence of characters as ESC another ESC character will be added to tell the receiver which section is data.
At receiver's end, this data section will be removed and be treated as a piece of data.
Clearly, this procedure does not account for 16-bit or 32-bit characters we use today, so we rely on bit-stuffing protocols (mostly).
1 answer
A connectionless protocol is one where the client does not make a connection to the server. This is typically the UDP subprotocol of TCP/IP. There is one packet sent for each message. The client and server applications are responsible for all validation, sequencing, and acknowledgment issues. Its a little like standing in a field with a megaphone. You yell out your message and, if someone hears it that needs to hear it, they answer with their own megaphone. If you don't get an answer, you wait a bit and try again. A connection-oriented protocol is one where the client establishes a connection for each conversation with the server. This is typically the TCP subprotocol of TCP/IP. There can be many packets sent back and forth during the conversation, but that is no longer the concern of the application. The protocol stacks on each machine are responsible for validation, sequenceing, acknowledgement, retries, etc. Its a little like making a telephone call. You pick up the phone and dial a number. The other party may or may not answer, but when they do you can have a conversation.
1 answer
transport layer
4 answers
HDLC (High-Level Data Link Control) is a bit-oriented synchronous data link layer protocol
cHDLC (Cisco HDLC) was created by cisco to address the HDLC protocol's inability to provide multi-protocol support. Thus, cHDLC frames contain a field for identifying the network protocol being encapsulated.
Ethernet networks are packet based and have no concept of a connection or circuit and also lack basic security features By using PPPoE (encapsulation), users can "dial" from one machine to another over an Ethernet network, establish a point to point connection between them and then securely transport data packets over the connection.
Answer: security
1 answer
Bit stuffing is the insertion of non information bits into the data bits.In high level data link control protocol(HDLC),it provides a means of synchronization.
1 answer
This User Datagram Protocol (UDP) is defined to make available a datagram mode of packet-switched computer communication in the environment of an interconnected set of computer networks. This protocol assumes that the Internet Protocol IP is used as the underlying protocol. This protocol provides a procedure for application programs to send messages to other programs with a minimum of protocol mechanism. The protocol is transaction oriented, and delivery and duplicate protection are not guaranteed. Applications requiring ordered reliable delivery of streams of data should use the Transmission Control Protocol TCP. l
4 answers
1 answer
It reads the protocol/bit stream/header
1 answer
G. J. Lipovski has written:
'Object-oriented interfacing to 16-bit microcontrollers' -- subject(s): Computer interfaces, Microcomputers, Object-oriented programming (Computer science), Programming
1 answer
**The TCP transport layer protocol uses windowing and acknowledgments for reliable transfer of data. **The TCP and UDP port numbers are used by application layer protocols. **The TCP transport layer protocol provides services to direct the data packets to their destination hosts.
2 answers
IP address are the unique address. IP or internet protocol addresses are also known as logical addresses . The 32 bit address is the IPV4 address.
1 answer