mention the funtions about connection oriented and
connectionless protocol and how it works ?

Answers were Sorted based on User's Feedback



mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / bhisham kumar

connectionless protocols are the protocols that provided
connectionless service in a network fro e.g UDP provide
connectionless sevices in data link layer in which data
loss more


A connection oriented protocols are those provided by the
data link layer in TCP in which first connection
established then data transfer after getting the reply from
the another end good as compare to the connection less
protocols

Is This Answer Correct ?    5 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / neeru sharma

Connectionless protocols are the protocols that enable
connectionless services in a network. The internet Protcol
(IP) and UDP
A connection-oriented networking protocol is one that
delivers a stream of data in the same order as it was sent,
after first establishing a communication .TCP/IP

Is This Answer Correct ?    4 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / jeevi

connection oriented:
1. Tcp is a connection oriented protocol
2.reliable network service 3.it is guaranted to deliver the
data 4.packets should follow the same path,loss of data does
not occur.

connection less:
1.UDP is connection less
2.unreliable service 3.it is not guaranted to deliver the data
4.packets do not need to arrive in specific order
5.loss of data occurs.

Is This Answer Correct ?    4 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / s.m.feroz ahmed

Hi,

TCP is a Connection Oriented Protocol and UDP is a
Connectionless protocol.TCP is a Non Reliable where as UDP
is a relaiable .UDP is fast when compared to TCP as UDP is
a Connectionless protocol.

Is This Answer Correct ?    1 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / salman

tcp and udp

Is This Answer Correct ?    0 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / shashikant sharma

In connection-oriented protocols, corresponding entities
maintain state information about the dialogue they are
engaged in. This connection state information supports
error, sequence and flow control between the corresponding
entities. The windowing scheme presented earlier is an
example of a connection-oriented protocol.

Error control refers to a combination of error detection
(and correction) and acknowledgment sufficient to
compensate for any unreliability inherent to the channel.
Sequence control refers to the ability for each entity to
reconstruct a received series of messages in the proper
order in which they were intended to be received; this is
essential to being able to transmit large files across
dynamically-routed mesh networks. Flow control refers to
the ability for both parties in a dialogue to avoid
overrunning their peer with too many messages.

Connection-oriented protocols operate in three phases. The
first phase is the connection setup phase, during which the
corresponding entities establish the connection and
negotiate the parameters defining the connection. The
second phase is the data transfer phase, during which the
corresponding entities exchange messages under the auspices
of the connection. Finally, the connection release phase is
when the correspondents "tear down" the connection because
it is no longer needed.

An everyday example of a connection-oriented protocol is a
telephone call. The call originator must first "dial" the
destination phone number. The telephony infrastructure must
setup the end-to-end circuit, then "power ring" the call
terminator. From this point on, the connection is in place
until one of the parties hangs up. Once the called party
answers the phone, another level of connection (between
people) must be established before real messages can be
exchanged.

Connectionless protocols differ markedly from connection-
oriented protocols in that they do not provide the
capability for error, sequence and flow control. Nor do
they have any connection state maintenance requirement.
Each message is considered to be independent of all others
in a connectionless protocol. Whether or not a given
message is received correctly and when has no bearing on
other messages; somehow the destination must sort things
out and make sense of it all.
Connectionless protocols are always in the data transfer
phase, with no explicit setup or release phases as in
connection-oriented protocols.

Is This Answer Correct ?    0 Yes 0 No

mention the funtions about connection oriented and connectionless protocol and how it works ?..

Answer / bhisham kumar

sry work on the transport layer

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 Answers  


what are the port numbers for DNS,FTP,TELNET,SMTP,NNTP

5 Answers   Airtel, Walton Group,


Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'

1 Answers  


What is the maximum hop count for IP RIP? A.) Infinity B.) 16 C.) 15 D.) 1

3 Answers   Cisco,


What is a digital certificate?

0 Answers   CCIE,






What is public and private ip address., explain? and also explain the ip address range of both public and private? and where we use that public and private ip address?

13 Answers  


what is diffrence betwwen mpls and frame really

1 Answers   Aptron, Volvo,


What is switch priority & why it is used????

5 Answers   ADP,


Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length

1 Answers  


Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899

1 Answers  


What is segmentation and fragmentation?

0 Answers  


Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node

1 Answers  


Categories