Posts

Transport Layer Protocols

Need of Transport Layer a. The Internet layer provides unreliable , connectionless service - "best effort" network. b. The underlying layer (internal layer ) provides the connectionless protocol IP . c. Datagrams may be lost or reordered . d. Datagrams can be duplicated or delivered after long delays . Thus , there is a need for a layer , which takes care of end - to - end delivery. Features of transport layer i. True end to end layer . ii . Takes care of process to process delivery. iii . Acts as a liaison between the application layer and the underlying internetwork details . iv . Shields the applications  from  the complexities of the internetwork. v. Provides a "logical communication " between application processes running on different hosts . For this purpose ,it performs the following duties: i. Packetizing : Divides the application data into packets to be sent over the internetwork . ii . Connection Control : Controls the "logical " c...

Hash Table

If we have a table organization and a search technique which retrieve the key in a single access ,it would be very efficient. To do so, the position of the key in the table should not depend upon the other keys but the location should be calculated on the basis of the key itself .Such an organization and search technique is called hashing . In hashing the address or location of an identifier X is obtained by using some function f(X) which gives address of X in a table. HASHING TERMINOLOGY Hash function :- A function that transforms a key X into a table index is called a hash function. Hash address:- The address of X computed by the hash function is called the hash address or home address of X. Hash Table :- The memory available to maintain the symbol table is sequential . This is referred to as hash table . Bucket :- Each hash table is partitioned into b buckets ht[0]......ht[b-1]. Each bucket is capable of holding 's' records . Thus , a bucket consists of 's' sl...