Parameters of Token Passing Protocol in Computer Network Explained

preview_player
Показать описание
Parameters of Token Passing Protocol in Computer Network is explained with the following Timestamps:
0:00 - Parameters of Token Passing Protocol - Computer Network
1:09 - K Bit delay and K Bit Distance
4:08 - Ring Latency
7:10 - Token Holding Time
8:33 - Cycle Time
10:34 - Efficiency of Token Passing Protocol
12:07 - Delayed Token Reinsertion
14:45 - Efficiency of Delayed Token Reinsertion
17:00 - Early Token Reinsertion
21:24 - Efficiency of Early Token Reinsertion
22:23 - Comparison of Delayed Token Reinsertion and Early Token Reinsertion

Parameters of Token Passing Protocol in Computer Network is explained with the following outlines:
0. Computer Network
1. Controlled Access Protocols
2. Token Passing Protocol
3. Parameters of Token Passing Protocol

Chapter-wise detailed Syllabus of the Computer Network Course is as follows:

Computer Network Basics, Types of Data Communication in Computer Network, Types of Casting in Computer Network, Peer to Peer Network Vs Client Server Network, Types of Computer Network, Topologies of Computer Network.

Basics of OSI Model, OSI Model Details, Comparison of TCP and UDP, Comparison of OSI Model and TCP/IP Model, Transmission Medium in Computer Network, IP Address, MAC Address and Port Address.

Data Link Layer Basics, Transmission Delay & Propagation Delay, Stop & Wait ARQ Protocol, Capacity of Channel in Computer Network, Sliding Window Protocol, Go Back N ARQ Protocol, Selective Repeat ARQ Protocol, Comparison of Sliding Window Protocol, Go Back N ARQ Protocol and Selective Repeat ARQ Protocol, Media Access Protocols, Channelization Protocols: FDMA, TDMA, CDMA, Polling Protocol, Reservation Protocol, Token Passing Protocol, Pure ALOHA, Slotted ALOHA, CSMA - Carrier Sense Multiple Access, CSMA/CD, Back off Algorithm for CSMA/CD, CSMA/CA.

VRC - Vertical Redundancy Check & LRP - Longitudinal Redundancy Parity, Checksum, CRC - Cyclic Redundancy Check, Hamming Code for Error Correction and Error Detection, Minimum Hamming Distance, Error Detection Capabilities & Error Correction Capabilities.

Framing, Ethernet LAN Protocol - IEEE 802.3, Wireless LAN Protocol - IEEE 802.11, Token Ring LAN Protocol - IEEE 802.5, Examples on CSMA Protocols, Examples on Flow Control Protocols.

Repeater, Hub, Bridge, Switch, Router and Brouter, Comparison of Repeater Hub Bridge Switch Router and Brouter, Network Segment, Collision Domain & Broadcast Domain, Spanning Tree Protocol.

Network Layer Basics, logical Addressing, Classful Addressing of IP Address, Subnetting, Classes Inter-Domain Routing - CIDR, Subnet Masking, Supernetting, IPV4 Frame Format, Fragmentation, IPV4 Broadcasting, Localhost and Loopback, ARP, RARP, BOOTP , DHCP, Public IP and Privet IP, NAT - Network Address Translation, ICMP, Routing, Non Adaptive Routing, Distance Vector Routing, Link State Routing, Circuit Switching, Packet Switching and Message Switching, IPV6, IPV6 Casting, IPV6 Frame Format.

Transport Layer Basics, TCP Frame Format, Port Number & Network Socket, Sequence Number & Acknowledgment Number in TCP, Wrap Around Time and Life Time in TCP, Header Length and Checksum in TCP, TCP Connections, PSH URG RST Urgent Pointer and Option Field in TCP, Flow Control in TCP Protocol, Sliding Window Protocol in TCP, Retransmission in TCP, Congestion Control in TCP, Timers in TCP, Basic Algorithm for Timeout Timer in TCP, Jacobson's Algorithm for Timeout Timer in TCP, Karn's Modification of Timeout Timer in TCP, Silly Window Syndrome and It's Solution in TCP, Congestion Control using Traffic Shaping in TCP, Leaky Bucket Algorithm, Token Bucket Algorithm, UDP - User Datagram Protocol, UDP Segment Header, UDP Frame Format.

Application Layer Basics, DNS - Domain Name System, SMTP POP and IMAP, HTTP/HTTPs , FTP SFTP and TFTP - File Transfer Protocols.

Engineering Funda channel is all about Engineering and Technology. Here this video is a part of Computer Network.

#DataLinkLayer #ComputerNetwork #ComputerNetworking @EngineeringFunda
Рекомендации по теме
Комментарии
Автор

🔥All Premium Courses Link of Engineering Funda🔥

EngineeringFunda
Автор

Sir the reason for considering ring latency, is due to the transmission of token is it, like in etr on the way the host can or cannot sen frame based on requirement . which is not in case of dtr, so we consider the additional time for propod=gating token from token holder to next one, in general way

benasabu