Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
Distributed shared memory (DSM) provides processes with a shared address space across distributed memory systems. DSM exists only virtually through primitives like read and write operations. It gives the illusion of physically shared memory while allowing loosely coupled distributed systems to share memory. DSM refers to applying this shared memory paradigm using distributed memory systems connected by a communication network. Each node has CPUs, memory, and blocks of shared memory can be cached locally but migrated on demand between nodes to maintain consistency.
The document discusses error detection and correction techniques used in data communication. It describes different types of errors like single bit errors and burst errors. It then explains various error detection techniques like vertical redundancy check (VRC), longitudinal redundancy check (LRC), and cyclic redundancy check (CRC). VRC adds a parity bit, LRC calculates parity bits for each column, and CRC uses a generator polynomial to calculate redundant bits. The document also discusses Hamming code, an error correcting code that uses redundant bits to detect and correct single bit errors.
The document discusses data link layer framing and protocols. It describes: 1) Two main approaches to framing - byte-oriented (using sentinel characters) and bit-oriented (using bit stuffing). Protocols discussed include BISYNC, DDCMP, and HDLC. 2) Features of PPP framing including negotiated field sizes and use of LCP control messages. 3) Functions of data link layer including framing, flow control, error control, and media access control. The relationship between the logical link control and media access control sublayers is also covered.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
The document discusses the TCP/IP protocol suite and compares it to the OSI model. It describes the layers of the TCP/IP model including the physical, data link, internet, and transport layers. The transport layer uses TCP and UDP, with TCP being connection-oriented and reliable, while UDP is connectionless. The internet layer uses IP to transport datagrams independently. The OSI model has 7 layers while TCP/IP has 5 layers that do not directly correspond to the OSI layers.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA
This document discusses cloud computing protocols. It begins by defining cloud computing as using remote servers over the internet to store and access data and applications. The cloud is broken into three categories: applications, storage, and connectivity. Protocols are then defined as sets of rules that allow electronic devices to connect and exchange information. Ten specific protocols are described: Gossip protocol for failure detection and messaging; Connectionless network protocol for fragmentation; State routing protocol for path selection; Internet group management protocol for multicasting; Secure shell protocol for secure remote login; Coverage enhanced ethernet protocol for network traffic handling; Extensible messaging and presence protocol for publish/subscribe systems; Advanced message queuing protocol for point-to-point messaging; Enhanced interior
The document discusses network models including the OSI model and TCP/IP model. It describes the seven layers of the OSI model and the functions of each layer. It also discusses the four layers of the TCP/IP model and compares the two models, noting they are similar in concept but differ in number of layers and how protocols fit within each model.