mention the funtions about connection oriented and
connectionless protocol and how it works ?
Answers were Sorted based on User's Feedback
Answer / bhisham kumar
connectionless protocols are the protocols that provided
connectionless service in a network fro e.g UDP provide
connectionless sevices in data link layer in which data
loss more
A connection oriented protocols are those provided by the
data link layer in TCP in which first connection
established then data transfer after getting the reply from
the another end good as compare to the connection less
protocols
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / neeru sharma
Connectionless protocols are the protocols that enable
connectionless services in a network. The internet Protcol
(IP) and UDP
A connection-oriented networking protocol is one that
delivers a stream of data in the same order as it was sent,
after first establishing a communication .TCP/IP
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / jeevi
connection oriented:
1. Tcp is a connection oriented protocol
2.reliable network service 3.it is guaranted to deliver the
data 4.packets should follow the same path,loss of data does
not occur.
connection less:
1.UDP is connection less
2.unreliable service 3.it is not guaranted to deliver the data
4.packets do not need to arrive in specific order
5.loss of data occurs.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
TCP is a Connection Oriented Protocol and UDP is a
Connectionless protocol.TCP is a Non Reliable where as UDP
is a relaiable .UDP is fast when compared to TCP as UDP is
a Connectionless protocol.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / shashikant sharma
In connection-oriented protocols, corresponding entities
maintain state information about the dialogue they are
engaged in. This connection state information supports
error, sequence and flow control between the corresponding
entities. The windowing scheme presented earlier is an
example of a connection-oriented protocol.
Error control refers to a combination of error detection
(and correction) and acknowledgment sufficient to
compensate for any unreliability inherent to the channel.
Sequence control refers to the ability for each entity to
reconstruct a received series of messages in the proper
order in which they were intended to be received; this is
essential to being able to transmit large files across
dynamically-routed mesh networks. Flow control refers to
the ability for both parties in a dialogue to avoid
overrunning their peer with too many messages.
Connection-oriented protocols operate in three phases. The
first phase is the connection setup phase, during which the
corresponding entities establish the connection and
negotiate the parameters defining the connection. The
second phase is the data transfer phase, during which the
corresponding entities exchange messages under the auspices
of the connection. Finally, the connection release phase is
when the correspondents "tear down" the connection because
it is no longer needed.
An everyday example of a connection-oriented protocol is a
telephone call. The call originator must first "dial" the
destination phone number. The telephony infrastructure must
setup the end-to-end circuit, then "power ring" the call
terminator. From this point on, the connection is in place
until one of the parties hangs up. Once the called party
answers the phone, another level of connection (between
people) must be established before real messages can be
exchanged.
Connectionless protocols differ markedly from connection-
oriented protocols in that they do not provide the
capability for error, sequence and flow control. Nor do
they have any connection state maintenance requirement.
Each message is considered to be independent of all others
in a connectionless protocol. Whether or not a given
message is received correctly and when has no bearing on
other messages; somehow the destination must sort things
out and make sense of it all.
Connectionless protocols are always in the data transfer
phase, with no explicit setup or release phases as in
connection-oriented protocols.
| Is This Answer Correct ? | 0 Yes | 0 No |
Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
What causes a triggered update to reset the router hold-down timer?
Which ISDN specification series deals with Concepts and Terminology? A.) C- Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series
Which of the following would be displayed by the command 'SHOW CDP NEIGHBOR DETAIL'? A.) The incoming/outgoing port. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
Is hsrp is cisco proprietary or introduced by ieee?
Which command successfully pings an individual IP address? A. Router> ping 192.5.5.0 B. Router# ping 192.5.5.30 C. Router> ping 192.5.5.256 D. Router# ping 192.5.5.255
Does a bridge divide a network into smaller sections?
What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged
hi shain i have got some virus who make the .exe file that is duplicate of original file on my server 2007 windows can u suggest me any anti virus help help please help
What command do we give if router ios is stucked?