Escolar Documentos
Profissional Documentos
Cultura Documentos
Distance is the cost of reaching a destination, usually based on the number of hosts the path
passes through, or the total of all the administrative metrics assigned to the links in the path.
Vector
From the standpoint of routing protocols, the vector is the interface traffic will be forwarded
out in order to reach an given destination network along a route or path selected by the
routing protocol as the best path to the destination network.
SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an
email client, such as Outlook Express, to an email server or when email is delivered from one
email server to another. SMTP uses port 25.
POP3
POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an
email server. The POP3 protocol is simple and does not offer many features except for download.
Its design assumes that the email client downloads all available email from the server, deletes
them from the server and then disconnects. POP3 normally uses port 110.
IMAP
IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3.
It, too, is a protocol that an email client can use to download email from an email server.
However, IMAP includes many more features than POP3. The IMAP protocol is designed to let
users keep their email on the server.
Non-persistent
HTTP/1.0
Persistent
on same TCP connection: server, parses request, responds, parses new request,..
Client sends requests for all referenced objects as soon as it receives base HTML.
Segmentation :
B] Fragmentation :
➨As there is very less delay for the call to be established and also during the conversation, the circuit switching
network is widely used for realtime voice services throughtout the world since years. There is almost no waiting time
➨It will have realistic voice communication and consecutively speaking persons are easily identified due to higher
since there is no need for each packet to contain the full address;
network resources are allocated at call setup so that even during times of congestion,
provided that a call has been setup, the subsequent packets should get through;
Disadvantages[edit]
Flooding can be costly in terms of wasted bandwidth. While a message may only have one
destination it has to be sent to every host. In the case of a ping flood or a denial of service
attack, it can be harmful to the reliability of a computer network.
Messages can become duplicated in the network further increasing the load on the networks
bandwidth as well as requiring an increase in processing complexity to disregard duplicate
messages.
Duplicate packets may circulate forever, unless certain precautions are taken:
Use a hop count or a time to live (TTL) count and include it with each packet. This value
should take into account the number of nodes that a packet may have to pass through on
the way to its destination.
Have each node keep track of every packet seen and only forward each packet once.
Enforce a network topology without loops.