mention the funtions about connection oriented and
connectionless protocol and how it works ?
Answers were Sorted based on User's Feedback
Answer / bhisham kumar
connectionless protocols are the protocols that provided
connectionless service in a network fro e.g UDP provide
connectionless sevices in data link layer in which data
loss more
A connection oriented protocols are those provided by the
data link layer in TCP in which first connection
established then data transfer after getting the reply from
the another end good as compare to the connection less
protocols
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / neeru sharma
Connectionless protocols are the protocols that enable
connectionless services in a network. The internet Protcol
(IP) and UDP
A connection-oriented networking protocol is one that
delivers a stream of data in the same order as it was sent,
after first establishing a communication .TCP/IP
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / jeevi
connection oriented:
1. Tcp is a connection oriented protocol
2.reliable network service 3.it is guaranted to deliver the
data 4.packets should follow the same path,loss of data does
not occur.
connection less:
1.UDP is connection less
2.unreliable service 3.it is not guaranted to deliver the data
4.packets do not need to arrive in specific order
5.loss of data occurs.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
TCP is a Connection Oriented Protocol and UDP is a
Connectionless protocol.TCP is a Non Reliable where as UDP
is a relaiable .UDP is fast when compared to TCP as UDP is
a Connectionless protocol.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / shashikant sharma
In connection-oriented protocols, corresponding entities
maintain state information about the dialogue they are
engaged in. This connection state information supports
error, sequence and flow control between the corresponding
entities. The windowing scheme presented earlier is an
example of a connection-oriented protocol.
Error control refers to a combination of error detection
(and correction) and acknowledgment sufficient to
compensate for any unreliability inherent to the channel.
Sequence control refers to the ability for each entity to
reconstruct a received series of messages in the proper
order in which they were intended to be received; this is
essential to being able to transmit large files across
dynamically-routed mesh networks. Flow control refers to
the ability for both parties in a dialogue to avoid
overrunning their peer with too many messages.
Connection-oriented protocols operate in three phases. The
first phase is the connection setup phase, during which the
corresponding entities establish the connection and
negotiate the parameters defining the connection. The
second phase is the data transfer phase, during which the
corresponding entities exchange messages under the auspices
of the connection. Finally, the connection release phase is
when the correspondents "tear down" the connection because
it is no longer needed.
An everyday example of a connection-oriented protocol is a
telephone call. The call originator must first "dial" the
destination phone number. The telephony infrastructure must
setup the end-to-end circuit, then "power ring" the call
terminator. From this point on, the connection is in place
until one of the parties hangs up. Once the called party
answers the phone, another level of connection (between
people) must be established before real messages can be
exchanged.
Connectionless protocols differ markedly from connection-
oriented protocols in that they do not provide the
capability for error, sequence and flow control. Nor do
they have any connection state maintenance requirement.
Each message is considered to be independent of all others
in a connectionless protocol. Whether or not a given
message is received correctly and when has no bearing on
other messages; somehow the destination must sort things
out and make sense of it all.
Connectionless protocols are always in the data transfer
phase, with no explicit setup or release phases as in
connection-oriented protocols.
| Is This Answer Correct ? | 0 Yes | 0 No |
HI friends mine one of the friends have ask a good question i also donot know the answer so i am putting here Please poet the answer no matter it is wright or wrong put yours view here The question is like that when we are going to configure ospf then there are three way 1st way router ospf 10 netwrok 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 the 2nd way is like that router ospf 10 netwrok 192.168.0.0 0.0.255.255 area 0 but he inrodused the thrird way like router ospf 10 netwrok 192.168.00000001.0 < ?.?.?.?>area 0 router ospf 10 netwrok 192.168.00000010 <?.?.?.?>area 0 now problem is that what should i put the mask in this way so i puted ? sign Please solve this problem i think this is good one plz donot see for answer please contribute any thing i am reqesting Than you Jitendera kuamr sinha
Explain the terms unicast, multicast, broadcast and multicast.
How many types of nat?
What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication
In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify? A. That one message timed out. B. That all messages were successful. C. That one message was successful. D. That one message completed in under the allotted timeframe.
what is 5-4-3 rule?
Can u convert an ethernet port to a serial port (or) vice versa ?
How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?
Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
9. Which STP state prevents the use of looped paths? A. Blocking B. Listening C. Learning D. Forwarding