Homework help > What are the two common network protocols used in ... > Published by: CPA Guru 3 years ago
By: CPA Guru
Subject: IT/Web
Answered

What are the two common network protocols used in database environments and their relative strengths and weaknesses. ...[Show More]

3 years ago


Answer the Question above

Answers (1)


Network protocol are used for the transportation of data from a client to database server over a given network. Some of the network protocol includes TCP/IP and named pipes protocols. TCP/IP is mostly used over the internet, it allows communication between nodes which are interconnected together in a network and have a number of operating system and hardware architectures (Weissman, et al, 2012). It has 4 layers data link layer, network layer, transport layer and application layer. The data link is responsible for interconnecting all the nodes in a given network, the network layer is responsible for the connection of independent networks allowing the transportation of data contained in packets across a given network. Strengths of TCP/IP protocol i. This protocol is interoperable allowing the communication between heterogeneous networks through a cross platform layer. ii. The protocol is scalable allowing the addition of networks to the existing one without interrupting the current operations iii. It is able to uniquely identify nodes and other devices in the network as it uniquely assigns each computer its IP address Weaknesses of TCP/IP protocol i. This protocol isn’t generic in its nature. It cannot represent any other protocol stack except the TCP/IP suite. ii. It is very difficult to differentiate between physical layer and data link layer. Proper protocols should differentiate the two layers iii. Differentiating between services, protocols and interfaces thus it is not suitable for a latest technologies to new networks Name pipes protocol Named pipes protocols are usually used for LAN (local area networks). Using a section of the memory one process passes data to another process ensuring that the output of one process is the input of another process. The process receiving the data may be locally within the computer or remotely accessed through a network. Strengths of named pipes It is capable of sending request from one process to another. This allows multiple users to send requests through the same path. Weakness of name pipes Multiple processes are not capable of sending data using the same path

By 3 years ago . Marked as helpful (284). Marked as unhelpful (280)


When you can’t seem to find the right answers

Get a step-by-step solution written by a professional tutor