What are the two common network protocols used in database environments and their relative strengths and weaknesses. ...[Show More]
3 years ago
Network protocol are used for the transportation of data from a client to database server over a given network. Some of the network protocol includes TCP/IP and named pipes protocols. TCP/IP is mostly used over the internet, it allows communication between nodes which are interconnected together in a network and have a number of operating system and hardware architectures (Weissman, et al, 2012). It has 4 layers data link layer, network layer, transport layer and application layer. The data link is responsible for interconnecting all the nodes in a given network, the network layer is responsible for the connection of independent networks allowing the transportation of data contained in packets across a given network. Strengths of TCP/IP protocol i. This protocol is interoperable allowing the communication between heterogeneous networks through a cross platform layer. ii. The protocol is scalable allowing the addition of networks to the existing one without interrupting the current operations iii. It is able to uniquely identify nodes and other devices in the network as it uniquely assigns each computer its IP address Weaknesses of TCP/IP protocol i. This protocol isn’t generic in its nature. It cannot represent any other protocol stack except the TCP/IP suite. ii. It is very difficult to differentiate between physical layer and data link layer. Proper protocols should differentiate the two layers iii. Differentiating between services, protocols and interfaces thus it is not suitable for a latest technologies to new networks Name pipes protocol Named pipes protocols are usually used for LAN (local area networks). Using a section of the memory one process passes data to another process ensuring that the output of one process is the input of another process. The process receiving the data may be locally within the computer or remotely accessed through a network. Strengths of named pipes It is capable of sending request from one process to another. This allows multiple users to send requests through the same path. Weakness of name pipes Multiple processes are not capable of sending data using the same path
By 3 years ago . Marked as helpful (284). Marked as unhelpful (280)
What are the various operations that can be performed on different Data Structures?...
By Antony Pius · 2 years ago
Explain various E-business strategy implementation success factors for Small and Medium Organization...
By Khaled Hkh · 3 years ago
Write short notes on the following. i) Internet ...
By Khaled Hkh · 3 years ago
BigBook, Inc. is a large book distributor with domestic and international distribution channels. The company orders from publishers and distributes...
By Hari · 3 years ago
which clouds are on-premise giving it managers complete control over the available resources?...
By Steve · 3 years ago