Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Priya Hamsa

Bronze
Ask Priya Hamsa
13 Visits
0 Followers
0 Questions
Home/ Priya Hamsa/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: September 16, 2021In: Q & A

    What Are Two Reasons For Physical Layer Protocols To Use Frame Encoding Techniques? (Choose Two.)

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    What Are Two Reasons For Physical Layer Protocols To Use Frame Encoding Techniques? (Choose two.) The first main reason is to prevent data collision during transmission of the data. The second reason is to provide the difference between the control information and the data. Now, let us discuss the pRead more

    What Are Two Reasons For Physical Layer Protocols To Use Frame Encoding Techniques? (Choose two.)

    The first main reason is to prevent data collision during transmission of the data. The second reason is to provide the difference between the control information and the data. Now, let us discuss the physical layer protocols and the frame encoding Techniques of the physical layer.

    The physical layer is the first layer from the bottom of the OSI model. It normally gives the fundamental base in order to build the network. Let us take an example to know about the types of connections. Let say we have a home router as shown in the below figure, the home router consists of many connections like an embedded wireless antenna, internet connection, ethernet switch, and different ports. We all know that the physical layer deals with the transmission of the bits. The OSI model is used to transport the bits that can make up the data link layer frame.

    There are three different types at the physical layer of the OSI model. They are through electrical signals, light pulses, and microwave signals.

    The electrical signals are nothing but through the copper or fiber optic cables. Another type is, we can transmit through light pulses. And the third type is through microwave signals.

    The physical layer of the OSI model is mostly implemented at the hardware, there are different standards at the physical layer of the OSI model, ISO, EIA/TIA, ITU-T, ANSI, IEEE.

    Now, let us discuss the frame encoding violations at the physical layer of the OSI model. The data framing at the data link layer is called the physical layer coding violations. When encoding at the physical layer contains any redundancy then the framing techniques are performed.

    Encoding violation is nothing but a method that is mostly used at the network layer of the OSI model, only when there is redundancy at the physical layer of the OSI. For suppose, let us consider Lan’s encoding, in it each bit of the data can be represented by using the two physical bits.

    Each bit of the data can be represented by two physical bits instead of one. Let us take a manchester encoding, here when the bit will be 1, this 1 can be represented as 10. For suppose if we encounter any 0, then this 0 is encoded into 01.

    Similarly, if we want to different the starting and the ending frame, whenever the combination of 0 and 0 is encountered and whenever the combination of 1 and 1 is encountered, these are not used for the purpose of the data, so these are used for as the frame boundaries.

    It is nothing but, to operate the division between the two frames or to make difference between the two frames at the data link layer of the OSI model. Then this is the best approach to exploit the redundancy.

    Hence, the error codes like 00 and 11 can be used at the end boundaries and as an escape between the frames of the data link layer.

    A wireless router that tracks user activity—but for a good reason | Ars  Technica

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: September 16, 2021In: Q & A

    Which Type Of Connector Does A Network Interface Card Use?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    Which Type Of Connector Does A Network Interface Card Use? The RJ-45 connector is used for the network interface card. Today, let us discuss the network interface card in detail. It is shortly called the NIC. We will connect the LAN cable to the computer in order to access the internet. For this, weRead more

    Which Type Of Connector Does A Network Interface Card Use?

    The RJ-45 connector is used for the network interface card. Today, let us discuss the network interface card in detail. It is shortly called the NIC.

    We will connect the LAN cable to the computer in order to access the internet. For this, we need to connect the male RJ-45 connector to the computer, laptop. The RJ-45 is embedded in a separate circuit. Hence, this circuit is called the network interface card.

    The network interface card is a separate computer component that is present in our computers that will help to connect to the other computers and to transmit the data. The other name for the network interface card is called the network interface controller or a local area network adapters(LAN adapters) or network adapters.

    The network interface card can be of two types. They are wired and wireless. The network interface cards that used Lan connections in order to transmit the data are called wired network interface cards. And the network interface cards that use wifi network in order to transmit the data area are called wireless network interface cards. We can able to connect between the two mobile phones by using the wireless network interface cards. Hence, the network interface cards are very essential for the devices to connect through a wireless network.

    The network interface card is the part of our computer that allows connecting to the other networks through a wireless network or through a wired network. But can every computer connect to the internet?. Hence to be able to connect to the internet we need a thing called the network interface card.

    This network interface card is going to connect to the motherboard and another part of it going to connect to an ethernet cable. This ethernet cable will connect one kind of communication media which will allow connecting to a network.

    Basically, the design of the network interface card is made up of two halves that can connect to the computer. One can connect through communication media and the other one is through the ethernet cable. There consists of a set of slots on the motherboard where the network interface card can be plugged into one of these slots. Other than the ethernet cards we can also use wifi cards and many more.

    The network interface card is a very cost-effective and essential component on the servers, printers, copiers, computers, and many more that can allow them to connect to the network. We can have more than one network adapter on a computer. And even some of the network interface cards can have more than one physical port or an interface in them. As we discussed earlier the most common connector is the RJ45 connector. These will takes the ethernet cables, cat 5, cat 5e, cat 6, etc. The network interface cards are basically will connect to the motherboard of a computer or to any device that you are using. We need a network adapter card to connect to the network or to the internet.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: September 16, 2021In: Q & A

    What Is The Most Used Rail On A Power Supply?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    What Is The Most Used Rail On A Power Supply? The +12 V is the most used rail on a power supply. Today, let us discuss the concept of rail in detail. The power supply can able to convert the AC current supply to the DC current. These are used by the AC CPU and the other components. The wires can ablRead more

    What Is The Most Used Rail On A Power Supply?

    The +12 V is the most used rail on a power supply. Today, let us discuss the concept of rail in detail. The power supply can able to convert the AC current supply to the DC current. These are used by the AC CPU and the other components. The wires can able to carry the voltage of 12, 5, and the 3.3-volt current for the graphics card, motherboard, and many more. But what is actually the rail mean?.

    The Rail is just a name to trace inside a power supply where the wires are joined to the single wire power supply. The single wire power supply has all the external connectors that are essentially coming from the same output. And the multi rail power supply has some of the express connectors which are running off of one. And some others like EPS, SATA connectors, CPU connectors are running off of the other ones.

    We can able to switch the single 12-volt rails to the multi 12-volt rails. We can do this through software by setting it to a single 12-volt rail. It is nothing but setting all your 12-volt capability is available on all the connectors and every time.

    The rails are simply the regulated transformers that can connect the domestic current into the voltages, that our computer system can use.

    Each of the 12-volt rails has an OCP circuit in it. OCP stands for overcurrent protection circuit. If any hardware failure occurs it can exceed the amount of the amplifier that is specified on the power supplies. This will shut the power supply protection by protecting everything else on the system.

    This power supply protection has some limitations. For example, if we have a power supply with the 420 amp and 12-volt rail, then each one of the four will be having 20 amps. The power requirements that we need are more than the 20 amps. The solution to getting this is to get a power supply with large single plus 12-volt rails. This is because we don’t have a limitation up to the 20 amps.

    Now, what are the 20 amps plus +12 volt limitations?. It is to comply with the specifications. They state that the no-home appliance can exceed up to 240 voltage amps and plus 12-volt rail. This is around 20 amps plus a 12-volt rail. The multi 20 amps + 12 volts may not be a problem, but when we want to use a massive multi-card setup or anything which requires an excessive amount of power. Then it is better to go with a large single +12 volt rail.

    Most of these power supplies are over 1000 watts. The simple rail consists of a set of electrical traces which can be monitored by the OCP (Overcurrent protection circuit). The OCP controller will join all the internal components of the power supply with the cables. And the electrical traces are the copper tracks through which the electricity will circulate.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: September 16, 2021In: Q & A

    What Addressing Information Is Recorded By A Switch To Build Its Mac Address Table?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    What Addressing Information Is Recorded By A Switch To Build Its Mac Address Table? Firstly, the switch will inspect the frames that are coming from the data link layer. Now, let us learn, how the switch will dynamically build the source address table. Let us learn about the layer 2 switch in detailRead more

    What Addressing Information Is Recorded By A Switch To Build Its Mac Address Table?

    Firstly, the switch will inspect the frames that are coming from the data link layer. Now, let us learn, how the switch will dynamically build the source address table. Let us learn about the layer 2 switch in detail.

    The switch can able to separate the collision domains in a network. For example, when Device A wants to send a frame to Device B, the sent frame can only be received by Device B. Similarly, when Device C wants to send a frame to Device D, then only the receiver D can able to get the frame. All the local communications in a local area network are called the one-to-one connection.

    The switch in a local area network will give a full bandwidth when the communication is going on in a network. It can also create a broadcast domain, a broadcast domain is nothing but the switched local area network using the FF-FF-FF-FF-FF-FF in a destination mac address. And all the other nodes in the domain can able to hear the message that is sent by any device.

    The forwarding of the frames is done by the mac addresses and by the creation of the source address table. But what actually, the source address table? The other name for the source address table is called the mac address table. The main purpose of a source address table is to know the destination address of any frame on a network, i.e to know exactly where to transmit the data traffic on a local area network.

    Now, let us know how to build the source address table in detail. The switch will copy the source mac address after we turn on the switch. After this, it will build a table for all the connected devices and the ports that are associated with them. The below figure is called the source address table. For example, when computer A wants to send a frame to computer B, then the switch will transmit the frame to the port where computer B is attached to.

    Similarly, it happens when Device C wants to send a frame to Device D. The switch will forward the packet to where Device D is connected. But what if the new devices are added to the switch. Let us take an example to understand this concept. Let say two new devices are added into the switch which is plugged into plug 7 and plug 8, here the source address cable doesn’t change.

    The switch can store the mac address of the newly connected device only after the devices want to send a frame to the other frame. The switch is not able to update the source address table unless it can receive the frame from the new device.

    Let us take a simple example, to understand this concept in detail. When a frame is forwarded from the new device, it will check the source mac address. Then it will be able to update the source address table.

    VTP and VLAN Lab Related Questions - 200-301 CCNA - New CCNA Past Questions  and Answers 2018

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: September 16, 2021In: Q & A

    Which Of The Following Is The First Step In The Boot Process?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    Which Of The Following Is The First Step In The Boot Process? The first step of the boot process is to provide power to the machine. Today, let us discuss the Boot process on a computer in detail. The understanding of the boot process gives various legal information. We use the boot tools in order tRead more

    Which Of The Following Is The First Step In The Boot Process?

    The first step of the boot process is to provide power to the machine. Today, let us discuss the Boot process on a computer in detail. The understanding of the boot process gives various legal information. We use the boot tools in order to control the booting process. Let us understand this in detail, what happens when we boot a computer.

    While we turn on the computer, the power supply will send the power to the motherboard of the computer. The motherboard plays an important while operating the computer. when we send power to the motherboard, it will activate the boot process.

    The ROM is called the read-only memory, where it stores the power on instructions in it. We have a read-only memory chip, which is part of bios(basic input-output system). A series of tests will be performed on the post to check if the system working correctly or not.

    The post instructions are nothing but a combination of audio and visual messages. The post instructions will checks each part of the CPU that displays it. It also checks the random access memory(RAM). Checking RAM is one of the basic steps to know whether it can communicate or not. It also checks the keyboard, mouse. It displays on the screen how to set up the bios program on the screen. We will have different keystrokes for each of the bios software vendors. Enter the keystroke of your system, it mostly is f2,f10 or it can be a delete key. It also stores the date, time, and booting order.

    We can set the computer to boot it from the hard drive, CD, or can be from USB. We need to change the boot order to set the computer to boot through a CD or hard drive. Now, let us know the process of booting in detail.

    Firstly, we switch on the power supply of the computer, the power will be sent to the motherboard of the computer. After this, we try to load the operating system of the computer into the main memory. The main memory is nothing put in the place where all the operations are getting executed. In order to perform any operation, first, it should load into the main memory.

    After this, we try to keep all the applications of the computer in a ready state, to make them available for the users if needed. The first program that runs on the computer after we switch on the system is BIOS. We might also reboot the system if any new software is installed on the computer. There is a chance of reboot if the system gets slow.

    We have two types of booting. They are warm booting and cold booting. When the system needs to restart even it is in a running state, this is called warm booting.

    And cold booting can be defined as after we start the system and give the power supply and the next step to perform this is to load the bios. This is called cold booting.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: September 16, 2021In: Q & A

    Which Of The Following Benefits Apply Only To Creating Vlans?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    Which Of The Following Benefits Apply Only To Creating Vlans? We can able to create multiple broadcast domains for creating the Vlans. Today let us see creating of the VLANs, the creating of the VLANs is a very easy process. Firstly we need to go to the configuration mode and give a VLAN or any numbRead more

    Which Of The Following Benefits Apply Only To Creating Vlans?

    We can able to create multiple broadcast domains for creating the Vlans. Today let us see creating of the VLANs, the creating of the VLANs is a very easy process. Firstly we need to go to the configuration mode and give a VLAN or any number between 2 to 1001.

    Switch(config-Vlan)#name<name>, this is the configuration VLAN mode that gives the specific name. Even if we don’t give any names, it will take a default name. We can create different Vlan’s like Vlan10, Vlan20, Vlan30, and many more.

    We can also verify these Vlan commands by using a command called show Vlan. Let us take an example to understand this concept in detail. Let say we have a topology, where several computers are connected to this topology, all these computers are connected from port number 1 to 12. Let us say all these computers are assigned with the Ip address 192.168.1.0/24.

    Now, go to the command line of the switch, if we try to verify by entering the command called as show Vlan. Here we can see all the VLANs that are present.

    The term VLAN stands for virtual local area network. The VLAN is like a local area network. All the network devices like computers, servers are logically connected to each other. These VLANs don’t care about the physical location of the network devices. Hence, all these network devices are logically combined into separate virtual networks.

    The main aim of Virtual networks is to increase security, manage traffic, and decrease the complexity of the network. Let us take a simpler example to understand the working of the Vlans. Let us consider we have a set of computers which belongs to certain departments are connected to a simple switch. This represents that all of these computers belong to a single local area network.

    Here all the traffic from the various departments is mixed up. Now, if we want to separate network broadcast traffic from the different departments. To achieve this we need to physically move the computers, and place the same department computers together, but this may be unnecessary work.

    This can be accomplished by the VLANs. These Vlans are capable to create several virtual networks in a separate network broadcast. Here we need to create three different Vlans which are of different departments. As we created three different Vlans, the traffic between all these departments is getting isolated. Hence, we cannot see any traffic that is created by the other departments even if they share the same switch.

    The creation of the Vlans is done on the switches by using the specific ports and by assigning these ports to a specific VLAN. On the switch, we will create Vlans for each department and plug the computers into the ports. similarly, we perform the same process to the other departments. hence, the network traffic can be separated from all the departments.

    Therefore, we have several reasons for the creation of the VLAN. One of the main reasons is to manage the traffic that comes from various departments.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: September 16, 2021In: Q & A

    Select The Term That Best Describes Automated Attack Software?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    Select The Term That Best Describes Automated Attack Software? The open-source software best describes the automated attack software. Today, let us know what is automated attack software and why open-source software is the best fit name for it. Open-source intelligence is gathering all the informatiRead more

    Select The Term That Best Describes Automated Attack Software?

    The open-source software best describes the automated attack software. Today, let us know what is automated attack software and why open-source software is the best fit name for it. Open-source intelligence is gathering all the information which we can get the data free of charge. The best example of open-source intelligence is the public source information like the internet.

    Any free information that we get on the internet can be assumed as open-source intelligence. The attacks can happen at any place where essential secret information is present. There are some of the automated attacks, let us discuss each of them in detail.

    Malware is a type of attack, malware is like any piece of code that will come into the system and execute in the network.

    Another type of attack is web-based attacks, we all are aware of this type of attack. When a certain user clicks the link it directly takes us to a page, which will really execute some of the bad code. The malware and the web-based attacks are handled by the user.

    The third type of attack is called an injection attack. It is based on the workloads when our workloads are running in our cloud. The attackers want to see what is happening at those endpoints. They just try to find a way to order to send some bad input to it.

    The fourth type of attack is called phishing. Here phishing attack is an interesting one. The attackers will send mail that looks like legitimate mail. In those mail, there may be a link that is attached to it. And when we click on that link we may get affected by the malware.

    And another type of category is the Distributed denial of services. Here we have some of the services. Here the attackers will send the continuous traffic of data through many computers.

    So we call Automated attack software open-source intelligence. Open-source intelligence mainly aims towards cyber security. It can also be related to non-network related applications The open-source intelligence is the combining of the data that is taken from multiple resources.

    Herewith the enormous amount of the information which is available to everyone present on the internet can access the data. Let us take an example to understand this in detail. If we want to locate a place that we are unable to find, then to resolve this, we, simply add a picture f that place, so that we can able to locate the exact location.

    Due to this open-source intelligence, i.e may publicly available information, for an attacker, this is the beginning place to plan out their attack. utilizing some of the tools and techniques is the first step in their journey.

    By using the open-source intelligence framework which contains some of the tools and techniques, that can be used to gather the information about the target. Knowing the name or address of the target is the basic step in order to acquire more information from it.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: September 16, 2021In: Q & A

    What Is Indicated By The Term Throughput?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:26 pm

    What Is Indicated By The Term Throughput? Throughput can be defined as the number of bits that are transferred over the medium in a given period of time. Today, let us discuss the concept of throughput in detail. The throughput is like the actual amount of the data that is passing through the mediumRead more

    What Is Indicated By The Term Throughput?

    Throughput can be defined as the number of bits that are transferred over the medium in a given period of time. Today, let us discuss the concept of throughput in detail. The throughput is like the actual amount of the data that is passing through the medium or through a connection.

    Let us consider an example to understand the throughput in detail. Let say that the network connection is like a bridge and the bits that are passing through it consider as a vehicle. Here, when we want to measure the number of vehicles that can be passed through the bridge, then it can be called bandwidth.

    For suppose the vehicles need to stop to pay for the toll, then the number of occurrences of the vehicles may decrease per hour, now we are talking about the throughput. But why do we need the term throughput?. What is the use of the throughput?.

    Now, let us learn this in detail. we all know that speed is the most important term that we need to measure to find any performance. And the way to measure this speed is through throughput and bandwidth. Let us take another example to understand this concept in detail. Let say there is a tank that has a capacity of 100 liters. Here the maximum capacity of the tank is considered as the bandwidth. But the tank has carried only 70 liters of water in it. Now, the actual liters that the tank is carrying is called the throughput.

    The throughput only says the amount of data that is transmitted from the source address to the destination address, but not the actual capacity of the medium can hold. The throughput can be measured as bits/sec or it can be measured as bytes per second. The measurement of the throughput can be done at any layer of the OSI model.

    The data transmitted per unit of time is called throughput. The standard unit of the data that is transmitted can be called a bit. And the standard elapsed time is called second. The maximum data that can be transmitted through a layer is called the maximum throughput. The other name of the maximum throughput is called the digital bandwidth. The throughput might not be at the physical layer but it may be at the other layers of the OSI model.

    The bandwidth capacity at the physical layer of the OSI model will not be a limit to the maximum throughput. The term throughput is also very common in the performance testing field. The term throughput can be used in various contexts. The term throughput can be used at the network, server, and at the request.

    There is another term that we need to compare with the throughput to avoid confusion. That is called latency. When we search anything on the web browser and the time taken to get a response from the server is called latency which is a slight difference from the term throughput.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: September 16, 2021In: Q & A

    Which Characteristic Describes An Ipv6 Enhancement Over Ipv4?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 1, 2021 at 12:25 pm

    Which Characteristic Describes An Ipv6 Enhancement Over Ipv4? The Ipv6 has the size of 128 bit when we compare it with the Ipv4. The IPv6 has the address of 128 bit when we compare it with the Ipv4 which is only 32 bit. Today, let us know about some of the benefits of the Ipv6 when we compare it witRead more

    Which Characteristic Describes An Ipv6 Enhancement Over Ipv4?

    The Ipv6 has the size of 128 bit when we compare it with the Ipv4. The IPv6 has the address of 128 bit when we compare it with the Ipv4 which is only 32 bit. Today, let us know about some of the benefits of the Ipv6 when we compare it with the Ipv4.

    We all know that internet protocols are the main rules for the transmission of data on any separate network. So the internet protocol will describe the header format of a datagram or for a packet. The data payload will be nested with it in order to improve efficiency. And the second most important thing is that to route or predict the best possible path for transmission of the data across various network boundaries.

    This process is mostly performed by the routers. The Ipv6 will be able to replace Ipv4 32 bit address with its 128-bit address. The Ipv6 will give some of the real benefits in controlling and in the convenience. When each device is able to approach all other devices that are on the network will be able to improve the performance. The Ipv6 can also able to configure itself rather than relying on any other things like DHCP. The header data must also be able to include every packet when it is larger to accommodate the longer addresses.

    As we discussed earlier, the Internet protocol helps to communicate with each other over a network. Let us take an example to understand this concept in detail. When a computer tries to send the information, the data will be broken into small parts called packets. Each of these packets will contain Ip information. We will assign Ip address to every device that is present on the network. So that we can uniquely identify the devices from the other devices.

    By assigning each device with an Ip address, the networks will be able to route effectively all the packets of the data and reach the right destination address. Even though the Ipv4 has a larger number of Ip addresses, we still need more. So the Ipv6 has come into the field. Now, let us learn some of the common differences between the Ipv4 and the Ipv6.

    The most common difference between the Ipv4 and the Ipv6 is in its format. And the other basic difference is in its size, the size of the Ipv4 is 32 bit whereas the size of ipv6 is 128 bit. Here the Ipv6 is 1028 times more than the Ipv4. It will essentially solve the lack of addresses problem. The Ipv6 is an alphanumeric address that is separated by the colons. The below figure 1.1 and 1.2 represents the structure of the Ipv4 and the Ipv6. As we can see the Ipv4 is only the numeric which can be separated by the periods and the Ipv6 is alphanumeric that can be separated by the colons.

    Typically, there is no difference between the addresses of Ipv4 and the Ipv6 addresses in terms of their speed, but the Ipv6 will be somewhat faster than the Ipv4.

    What is IPv4 Address? Conversion and Datagram format Explained!!! - YouTube

    1.1

    IPv6 address - Wikipedia

    1.2

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: September 16, 2021In: Q & A

    What Is The Complete Range Of Tcp And Udp Well-Known Ports?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on September 28, 2021 at 8:08 am

    What Is The Complete Range Of TCP And UDP Well-Known Ports? This TCP is a connection-oriented protocol. But what is connection-oriented protocol i.e it means that if two devices are connected would like to communicate with each other via a TCP, they must send some formal messages to each other in orRead more

    What Is The Complete Range Of TCP And UDP Well-Known Ports?

    This TCP is a connection-oriented protocol. But what is connection-oriented protocol i.e it means that if two devices are connected would like to communicate with each other via a TCP, they must send some formal messages to each other in order to set up the connection before any data can be transferred. This TCP will also be called a reliable protocol. When we send the data to another device via a TCP, the other device will acknowledge the received data. In this way, we can assure you that we have received the right information. This transmission control protocol will be keeping track of the data that is being sent, and in what order it is being received. This is the common thing in many of the networks. We will be sending the information out in a particular type of order, it is because of the way the traffic flows. And when it is received on the other side these frames may come out of the order. All the TCP’s can handle that piece. If anything will be missing during the transmission, it will again retransmit the data and put everything into the original form.

     

    Now, the user datagram protocol will be a different type of protocol comparing with the TCP protocol. It is a connection-less protocol. In the user datagram protocol, there will be no standard startup process in order to set up communication on another device. Here there will be no formal tear-down process. It simply sends the information into another device without any type of warning to it. Unlike the transmission control protocol, this will be an unreliable protocol. Here it represents that there will be no acknowledgment of the data is sent. So that there will be no retransmission of the data. Usually, the applications which are using UDP will not at all be concerned about the data that is transmitted or not.

     

    In the TCP/IP, we will start using the port numbers especially when we are referring to the special numbers. In the single IP packet, we will be having the IP address, server port number, client port number. This is how the end stations will send the information to each other and find their way to the correct service. we have nonephemeral ports which are permanent. These are set up for the particular application. And we have the ephemeral ports, these ephemeral ports will be having temporary port numbers. these port numbers are used to connect and start a conversation and once this conversion is over, this port number will be no longer in use. Let say if a device is communicating to a web server by using the ephemeral port on your device, so we can create a connection to a non-ephemeral port on that web server. Here when we give a port number to a device, it may be a TCP or UDP. This number is going to range between 0 and 65535. Here most of the servers will use the nonephemeral port numbers, although there are some of the services which are completely dynamic.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 7 8 9 10 11 … 15

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut