Skip to main content

NETWORKING (LECTURE 7)


                                           MARWARI COLLEGE,RANCHI
                                              (UNDER RANCHI UNIVERSITY RANCHI)
NAME : RAJU MANJHI,PRAKASH KUMAR
SUB: NETWORKING
SEM : IT IV
________________________________________________________________________________
Data Link layer:

What is Piggybacking .Explain the concept and disadvantages .


In all practical situations, the transmission of data needs to be bi-directional. This is called as full-duplex transmission.
We can achieve this full duplex transmission i.e. by having two separate channels-one for forward data transfer and the other for separate transfer i.e. for acknowledgements.
• A better solution would be to use each channel (forward & reverse) to transmit frames both ways, with both channels having the same capacity. If A and B are two users. Then the data frames from A to Bare intermixed with the acknowledgements from A to B.
• One more improvement that can be made is piggybacking.

The concept is explained as follows:
In two way communication, Whenever a data frame is received, the received waits and does not send the control frame (acknowledgement) back to the sender immediately.
The receiver waits until its network layer passes in the next data packet. The delayed acknowledgement is then attached to this outgoing data frame.
This technique of temporarily delaying the acknowledgement so that it can be hooked with next outgoing data frame is known as piggybacking.
• The major advantage of piggybacking is better use of available channel bandwidth.
• The disadvantages of piggybacking are:
1. Additional complexity. . If the data link layer waits too long before transmitting the acknowledgement, then retransmission of frame would take place.
 __________________________________________________________________________________________________






Comments

Popular posts from this blog

EDP INTRODUCTION

                                                     MARWARI COLLEGE RANCHI                                                (UNDER RANCHI UNIVERSITY ,RANCHI) RAJU MANJHI  DEP. OF B.Sc(CA) ,MCR ________________________________________________________________________________ SEMESTER : VI BCA/IT/BCM  SUBJECT : EDP TOPIC : DEFINITION OF EDP : Entrepreneurship 1.        Concept:            Entrepreneurship is derived from French root, which means to undertake. But people today call it by various names - adventuresome (to start something different from others), risk taking, thrill seeking (much of up’s and down’s), innovating (something new). Hence the word entrepreneurship in today’s concept can be called an event of adventuresome which takes risks, seeks thrills and innovative. I.         According to Higgins: Entrepreneurship is the function of seeking investment and production opportunity, organizing an enterprise to undertake a new function process, raising ca

EDP (LECTURE 3)

MARWARI COLLEGE,RANCHI (UNDER RANCHI UNIVERSITY,RANCHI) NAME : RAJU MANJHI SUB: EDP SEM: VI(CA/IT/CM) ______________________________________________________________________________ Identification of business opportunities. An entrepreneur perceives an   opportunity for marketing a product or service, then he establishes a business unit on the basis of his or her perception, finally he manages his enterprise, expanding, growing or diversifying over a period of time. In order to establish an entrepreneurial system an entrepreneur needs to take following steps for identification of right opportunity. 1)        Search for business idea: The task of promotion begins with the search of suitable business idea and opportunity. The idea may generate from various sources and should be rated to the starting of a new business or taking over an existing business enterprise. The idea should be sound and workable, so that it may be exploited. It should yield suitable return

Lecture 5 (BCM)

Benefits of Using Proxy Servers 1. Your IP Address Is Hidden One of the best proxy server advantages – by using a proxy, the website you access will not be able to log your real IP address, as it will log the proxy server’s IP address instead. Yes, that means you’re somewhat anonymous when you browse online. D on’t forget –   your IP address   ca n tell someone a lot about yourself, like what country and city you are from. Crafty cyber criminals can even go the extra mile and use your IP address to find out things like who your ISP is, what your zip code is, and even what street you live on.   How would a hacker get access to your IP address, you ask? Sadly, a data breach or leak on a website you visit could be enough for them to get their hands on this info. So, something like this is definitely useful nowadays. 2. You Can Access Geo-Blocked or Restricted Content Unfortunately, a lot of online content is actually hidden behind  geo-restrictions  – mostly because of net