Fragmentation at Network Layer - GeeksforGeeks

文章推薦指數: 80 %
投票人數:10人

Fragment offset (13 bits) – use to identify the sequence of fragments in the frame. It generally indicates a number of data bytes preceding or ... Skiptocontent TutorialsPracticeDS&Algo.MustDoQuestionsDSATopic-wiseDSACompany-wiseAlgorithmsAnalysisofAlgorithmsAsymptoticAnalysisWorst,AverageandBestCasesAsymptoticNotationsLittleoandlittleomeganotationsLowerandUpperBoundTheoryAnalysisofLoopsSolvingRecurrencesAmortizedAnalysisWhatdoes'SpaceComplexity'mean?Pseudo-polynomialAlgorithmsPolynomialTimeApproximationSchemeATimeComplexityQuestionSearchingAlgorithmsSortingAlgorithmsGraphAlgorithmsPatternSearchingGeometricAlgorithmsMathematicalBitwiseAlgorithmsRandomizedAlgorithmsGreedyAlgorithmsDynamicProgrammingDivideandConquerBacktrackingBranchandBoundAllAlgorithmsDataStructuresArraysLinkedListStackQueueBinaryTreeBinarySearchTreeHeapHashingGraphAdvancedDataStructureMatrixStringsAllDataStructuresInterviewCornerCompanyPreparationTopTopicsPracticeCompanyQuestionsInterviewExperiencesExperiencedInterviewsInternshipInterviewsCompetititveProgrammingDesignPatternsSystemDesignTutorialMultipleChoiceQuizzesLanguagesCC++JavaPythonC#JavaScriptjQuerySQLPHPScalaPerlGoLanguageHTMLCSSKotlinCSSubjectsMathematicsOperatingSystemDBMSComputerNetworksComputerOrganizationandArchitectureTheoryofComputationCompilerDesignDigitalLogicSoftwareEngineeringGATEGATEComputerScienceNotesLastMinuteNotesGATECSSolvedPapersGATECSOriginalPapersandOfficialKeysGATE2021DatesGATECS2021SyllabusImportantTopicsforGATECSWebTechnologiesHTMLCSSJavaScriptAngularJSReactJSNodeJSBootstrapjQueryPHPSoftwareDesignsSoftwareDesignPatternsSystemDesignTutorialSchoolLearningSchoolProgrammingMathematicsNumberSystemAlgebraTrigonometryStatisticsProbabilityGeometryMensurationCalculusMathsNotes(Class8-12)Class8NotesClass9NotesClass10NotesClass11NotesClass12NotesNCERTSolutionsClass8MathsSolutionClass9MathsSolutionClass10MathsSolutionClass11MathsSolutionClass12MathsSolutionRDSharmaSolutionsClass8MathsSolutionClass9MathsSolutionClass10MathsSolutionClass11MathsSolutionClass12MathsSolutionPhysicsNotes(Class8-11)Class8NotesClass9NotesClass10NotesClass11NotesCSExams/PSUsISROISROCSOriginalPapersandOfficialKeysISROCSSolvedPapersISROCSSyllabusforScientist/EngineerExamUGCNETUGCNETCSNotesPaperIIUGCNETCSNotesPaperIIIUGCNETCSSolvedPapersStudentCampusAmbassadorProgramSchoolAmbassadorProgramProjectGeekoftheMonthCampusGeekoftheMonthPlacementCourseCompetititveProgrammingTestimonialsGeekontheTopCareersInternshipJobsApplyforJobsPostaJobJOB-A-THONEventsCourses ComewritearticlesforusandgetfeaturedLearnandcodewiththebestindustryexpertsGetaccesstoad-freecontent,doubtassistanceandmore!ComeandfindyourdreamjobwithusGeeksDigestQuizzesGeeksCampusGblogArticlesIDECampusMantriHomeSavedVideosCoursesGBlogPuzzlesWhat'sNew? ChangeLanguage DataStructuresAlgorithmsInterviewPreparationTopic-wisePracticeC++JavaPythonCompetitiveProgrammingMachineLearningWebDevelopmentSDESheetPuzzlesGFGSchoolProjects RelatedArticles ▲RelatedArticlesComputerNetworkFundamentalsComputerNetworkTutorialsBasicsofComputerNetworkingGoalsofNetworksTypesofNetworkTopologyTypesofareanetworks–LAN,MANandWANIntroductionofMobileAdhocNetwork(MANET)TypesofMANETinComputerNetworkRedundantLinkproblemsinComputerNetworkDigitalSubscriberLine(DSL)WhatisScramblinginDigitalElectronics?DifferencebetweenUnipolar,PolarandBipolarLineCodingSchemesManchesterEncodinginComputerNetworkLet’sexperimentwithNetworkingLayersofOSIModelTCP/IPModelPhysicallayerNetworkDevices(Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter)TypesofTransmissionMediaTransmissionModesinComputerNetworks(Simplex,Half-DuplexandFull-Duplex)AnalogtoDigitalConversionDigitaltoAnalogConversionWirelessCommunication|Set1WirelessCommunication|Set2AnalogtoAnalogConversion(Modulation)DifferencebetweenBroadbandandBasebandTransmissionDesignIssuesinPhysicalLayerDataLinklayerMultipleAccessProtocolsinComputerNetworkP2P(PeerToPeer)FileSharingFraminginDataLinkLayerLANTechnologies|ETHERNETEthernetFrameFormatTokenRingframeformatBitStuffinginComputerNetworkDifferencebetweenBytestuffingandBitstuffingHammingCodeinComputerNetworkCarrierSenseMultipleAccess(CSMA)ControlledAccessProtocolsinComputerNetworkBack-offAlgorithmforCSMA/CDCollisionDetectioninCSMA/CDEfficiencyofCSMA/CDEfficiencyOfTokenRingErrorDetectioninComputerNetworksStopandWaitARQSlidingWindowProtocol|Set1(SenderSide)SlidingWindowProtocol|Set2(ReceiverSide)SlidingWindowProtocol|Set3(SelectiveRepeat)SlidingWindowprotocolsSummaryWithQuestionsProgramtoremotelyPowerOnaPCovertheinternetusingtheWake-on-LANprotocol.ProgramtocalculatetheRoundTripTime(RTT)IntroductionofMACAddressinComputerNetworkCollisionAvoidanceinwirelessnetworksMaximumDataRate(channelcapacity)forNoiselessandNoisychannelsTypesofswitchesinComputerNetworkNetworklayerIntroductionofInternetworkingLineConfigurationinComputerNetworksDifferencebetweenUnicast,BroadcastandMulticastinComputerNetworkCollisionDomainandBroadcastDomaininComputerNetworkIntroductionofClassfulIPAddressingIntroductionandIPv4DatagramHeaderIPv4DatagramFragmentationandDelaysFragmentationatNetworkLayerInternetProtocolversion6(IPv6)InternetProtocolversion6(IPv6)HeaderIPAddressing|ClasslessAddressingSupernettinginNetworkLayerLongestPrefixMatchinginRoutersProgramtodetermineclass,NetworkandHostIDofanIPv4addressCProgramtofindIPAddress,SubnetMask&DefaultGatewayIPv4ClasslessSubnetequationIntroductionofVariableLengthSubnetMask(VLSM)NetworkAddressTranslation(NAT)TypesofNetworkAddressTranslation(NAT)ClassificationofRoutingAlgorithmsTypesofRoutingClassesofRoutingProtocolsDifferencebetweenDistancevectorroutingandLinkStateroutingFixedandFloodingRoutingalgorithmsRoutingv/sRoutedProtocolsinComputerNetworkUnicastRouting–LinkStateRoutingDistanceVectorRouting(DVR)ProtocolRoutePoisoningandCounttoinfinityprobleminRoutingOnionRoutingConfigurationofRouteronastickInternetControlMessageProtocol(ICMP)HotStandbyRouterProtocol(HSRP)OpenShortestPathFirst(OSPF)ProtocolfundamentalsOpenShortestPathFirst(OSPF)protocolStatesOpenshortestpathfirst(OSPF)routerrolesandconfigurationRootBridgeElectioninSpanningTreeProtocolTypesofSpanningTreeProtocol(STP)EIGRPfundamentalsFeaturesofEnhancedInteriorGatewayRoutingProtocol(EIGRP)RoutingInformationProtocol(RIP)RoutingInformationProtocol(RIP)V1&V2LinkStateAdvertisement(LSA)AdministrativeDistance(AD)andAutonomousSystem(AS)CircuitSwitchinginComputerNetworkPacketSwitchingandDelaysinComputerNetworkDifferencesbetweenVirtualCircuitsandDatagramNetworksDifferencebetweenCircuitSwitchingandPacketSwitchingTracerouteinNetworkLayerHowAddressResolutionProtocol(ARP)works?ARP,ReverseARP(RARP),InverseARP(InARP),ProxyARPandGratuitousARPPacketflowinthesameNetworkPacketflowindifferentNetworkDifferencebetweenlayer-2andlayer-3switchesDifferencebetweenPingandTracerouteServersinComputerNetworkWhatisLocalHost?TransportlayerTransportLayerresponsibilitiesCongestionControlinComputerNetworksComputerNetwork|LeakybucketalgorithmServicesandSegmentstructureinTCPTCPCongestionControlTCP3-WayHandshakeProcessTCPConnectionEstablishmentTCPConnectionTerminationErrorControlinTCPTCPTimersTCPflagsTCPServer-ClientimplementationinCUserDatagramProtocol(UDP)DifferencesbetweenTCPandUDPMultiplexingandDemultiplexinginTransportLayerApplicationlayerProtocolsinApplicationLayerDomainNameSystem(DNS)inApplicationLayerAddressResolutioninDNS(DomainNameServer)DNSSpoofingorDNSCachepoisoningWhydoesDNSuseUDPandnotTCP?DynamicHostConfigurationProtocol(DHCP)DHCPRelayAgentinComputerNetworkHowDHCPserverdynamicallyassignsIPaddresstoahost?SimpleNetworkManagementProtocol(SNMP)SimpleMailTransferProtocol(SMTP)FileTransferProtocol(FTP)inApplicationLayerHTTPNon-Persistent&PersistentConnection|Set1MultipurposeInternetMailExtension(MIME)ProtocolDifferencebetweenhttp://andhttps://DifferencebetweenHTMLandHTTPWhat’sdifferencebetweenTheInternetandTheWeb?BasicsofWi-FiWifiprotectedsetup(WPS)Wifiprotectedaccess(WPA)DifferencebetweenLiFiandWiFiNetworkSecurityBasicNetworkAttacksinComputerNetworkTypesofVirusesIntroductionofFirewallinComputerNetworkZone-basedfirewallFirewallmethodologiesDenialofServiceandPreventionIntroductiontoCrypto-terminologiesDenialofServiceDDoSattackTypesofDNSAttacksandTacticsforSecurityActiveandPassiveattacksinInformationSecurityBirthdayattackinCryptographyDigitalSignaturesandCertificatesLZW(Lempel–Ziv–Welch)CompressiontechniqueRC4EncryptionAlgorithmRC5EncryptionAlgorithmSHA-512HashInJavaRSAAlgorithminCryptographyRSAAlgorithmusingMultiplePrecisionArithmeticLibraryWeakRSAdecryptionwithChinese-remaindertheoremImplementationofDiffie-HellmanAlgorithmDNACryptographyPortSecurityinComputerNetworkUnicodeinComputerNetworkMessageAuthenticationCodesHowmessageauthenticationcodeworks?SystemSecurityHashFunctionsinSystemSecurityTheCIAtriadinCryptographyImageSteganographyinCryptographyAccess-Lists(ACL)Dataencryptionstandard(DES)|Set1DifferencebetweenAESandDESciphersComputerNetworkQuizesComputerNetworks|Set1ComputerNetworks|Set2ComputerNetworks|Set3ComputerNetworks|Set4ComputerNetworks|Set5ComputerNetworks|Set6ComputerNetworks|Set7ComputerNetworks|Set8ComputerNetworks|Set9ComputerNetworks|Set10ComputerNetworkGATEQuestionsMiscTopicsinComputerNetworksCNDataLinkLayerNetworkLayerIPAddressingTransportLayerHTTPNon-Persistent&PersistentConnection|Set2(PracticeQuestion)ApplicationLayerNetworkSecurityTableofContentsComputerNetworkFundamentalsComputerNetworkTutorialsBasicsofComputerNetworkingGoalsofNetworksTypesofNetworkTopologyTypesofareanetworks–LAN,MANandWANIntroductionofMobileAdhocNetwork(MANET)TypesofMANETinComputerNetworkRedundantLinkproblemsinComputerNetworkDigitalSubscriberLine(DSL)WhatisScramblinginDigitalElectronics?DifferencebetweenUnipolar,PolarandBipolarLineCodingSchemesManchesterEncodinginComputerNetworkLet’sexperimentwithNetworkingLayersofOSIModelTCP/IPModelPhysicallayerNetworkDevices(Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter)TypesofTransmissionMediaTransmissionModesinComputerNetworks(Simplex,Half-DuplexandFull-Duplex)AnalogtoDigitalConversionDigitaltoAnalogConversionWirelessCommunication|Set1WirelessCommunication|Set2AnalogtoAnalogConversion(Modulation)DifferencebetweenBroadbandandBasebandTransmissionDesignIssuesinPhysicalLayerDataLinklayerMultipleAccessProtocolsinComputerNetworkP2P(PeerToPeer)FileSharingFraminginDataLinkLayerLANTechnologies|ETHERNETEthernetFrameFormatTokenRingframeformatBitStuffinginComputerNetworkDifferencebetweenBytestuffingandBitstuffingHammingCodeinComputerNetworkCarrierSenseMultipleAccess(CSMA)ControlledAccessProtocolsinComputerNetworkBack-offAlgorithmforCSMA/CDCollisionDetectioninCSMA/CDEfficiencyofCSMA/CDEfficiencyOfTokenRingErrorDetectioninComputerNetworksStopandWaitARQSlidingWindowProtocol|Set1(SenderSide)SlidingWindowProtocol|Set2(ReceiverSide)SlidingWindowProtocol|Set3(SelectiveRepeat)SlidingWindowprotocolsSummaryWithQuestionsProgramtoremotelyPowerOnaPCovertheinternetusingtheWake-on-LANprotocol.ProgramtocalculatetheRoundTripTime(RTT)IntroductionofMACAddressinComputerNetworkCollisionAvoidanceinwirelessnetworksMaximumDataRate(channelcapacity)forNoiselessandNoisychannelsTypesofswitchesinComputerNetworkNetworklayerIntroductionofInternetworkingLineConfigurationinComputerNetworksDifferencebetweenUnicast,BroadcastandMulticastinComputerNetworkCollisionDomainandBroadcastDomaininComputerNetworkIntroductionofClassfulIPAddressingIntroductionandIPv4DatagramHeaderIPv4DatagramFragmentationandDelaysFragmentationatNetworkLayerInternetProtocolversion6(IPv6)InternetProtocolversion6(IPv6)HeaderIPAddressing|ClasslessAddressingSupernettinginNetworkLayerLongestPrefixMatchinginRoutersProgramtodetermineclass,NetworkandHostIDofanIPv4addressCProgramtofindIPAddress,SubnetMask&DefaultGatewayIPv4ClasslessSubnetequationIntroductionofVariableLengthSubnetMask(VLSM)NetworkAddressTranslation(NAT)TypesofNetworkAddressTranslation(NAT)ClassificationofRoutingAlgorithmsTypesofRoutingClassesofRoutingProtocolsDifferencebetweenDistancevectorroutingandLinkStateroutingFixedandFloodingRoutingalgorithmsRoutingv/sRoutedProtocolsinComputerNetworkUnicastRouting–LinkStateRoutingDistanceVectorRouting(DVR)ProtocolRoutePoisoningandCounttoinfinityprobleminRoutingOnionRoutingConfigurationofRouteronastickInternetControlMessageProtocol(ICMP)HotStandbyRouterProtocol(HSRP)OpenShortestPathFirst(OSPF)ProtocolfundamentalsOpenShortestPathFirst(OSPF)protocolStatesOpenshortestpathfirst(OSPF)routerrolesandconfigurationRootBridgeElectioninSpanningTreeProtocolTypesofSpanningTreeProtocol(STP)EIGRPfundamentalsFeaturesofEnhancedInteriorGatewayRoutingProtocol(EIGRP)RoutingInformationProtocol(RIP)RoutingInformationProtocol(RIP)V1&V2LinkStateAdvertisement(LSA)AdministrativeDistance(AD)andAutonomousSystem(AS)CircuitSwitchinginComputerNetworkPacketSwitchingandDelaysinComputerNetworkDifferencesbetweenVirtualCircuitsandDatagramNetworksDifferencebetweenCircuitSwitchingandPacketSwitchingTracerouteinNetworkLayerHowAddressResolutionProtocol(ARP)works?ARP,ReverseARP(RARP),InverseARP(InARP),ProxyARPandGratuitousARPPacketflowinthesameNetworkPacketflowindifferentNetworkDifferencebetweenlayer-2andlayer-3switchesDifferencebetweenPingandTracerouteServersinComputerNetworkWhatisLocalHost?TransportlayerTransportLayerresponsibilitiesCongestionControlinComputerNetworksComputerNetwork|LeakybucketalgorithmServicesandSegmentstructureinTCPTCPCongestionControlTCP3-WayHandshakeProcessTCPConnectionEstablishmentTCPConnectionTerminationErrorControlinTCPTCPTimersTCPflagsTCPServer-ClientimplementationinCUserDatagramProtocol(UDP)DifferencesbetweenTCPandUDPMultiplexingandDemultiplexinginTransportLayerApplicationlayerProtocolsinApplicationLayerDomainNameSystem(DNS)inApplicationLayerAddressResolutioninDNS(DomainNameServer)DNSSpoofingorDNSCachepoisoningWhydoesDNSuseUDPandnotTCP?DynamicHostConfigurationProtocol(DHCP)DHCPRelayAgentinComputerNetworkHowDHCPserverdynamicallyassignsIPaddresstoahost?SimpleNetworkManagementProtocol(SNMP)SimpleMailTransferProtocol(SMTP)FileTransferProtocol(FTP)inApplicationLayerHTTPNon-Persistent&PersistentConnection|Set1MultipurposeInternetMailExtension(MIME)ProtocolDifferencebetweenhttp://andhttps://DifferencebetweenHTMLandHTTPWhat’sdifferencebetweenTheInternetandTheWeb?BasicsofWi-FiWifiprotectedsetup(WPS)Wifiprotectedaccess(WPA)DifferencebetweenLiFiandWiFiNetworkSecurityBasicNetworkAttacksinComputerNetworkTypesofVirusesIntroductionofFirewallinComputerNetworkZone-basedfirewallFirewallmethodologiesDenialofServiceandPreventionIntroductiontoCrypto-terminologiesDenialofServiceDDoSattackTypesofDNSAttacksandTacticsforSecurityActiveandPassiveattacksinInformationSecurityBirthdayattackinCryptographyDigitalSignaturesandCertificatesLZW(Lempel–Ziv–Welch)CompressiontechniqueRC4EncryptionAlgorithmRC5EncryptionAlgorithmSHA-512HashInJavaRSAAlgorithminCryptographyRSAAlgorithmusingMultiplePrecisionArithmeticLibraryWeakRSAdecryptionwithChinese-remaindertheoremImplementationofDiffie-HellmanAlgorithmDNACryptographyPortSecurityinComputerNetworkUnicodeinComputerNetworkMessageAuthenticationCodesHowmessageauthenticationcodeworks?SystemSecurityHashFunctionsinSystemSecurityTheCIAtriadinCryptographyImageSteganographyinCryptographyAccess-Lists(ACL)Dataencryptionstandard(DES)|Set1DifferencebetweenAESandDESciphersComputerNetworkQuizesComputerNetworks|Set1ComputerNetworks|Set2ComputerNetworks|Set3ComputerNetworks|Set4ComputerNetworks|Set5ComputerNetworks|Set6ComputerNetworks|Set7ComputerNetworks|Set8ComputerNetworks|Set9ComputerNetworks|Set10ComputerNetworkGATEQuestionsMiscTopicsinComputerNetworksCNDataLinkLayerNetworkLayerIPAddressingTransportLayerHTTPNon-Persistent&PersistentConnection|Set2(PracticeQuestion)ApplicationLayerNetworkSecurityImproveArticle SaveArticle LikeArticle FragmentationatNetworkLayerDifficultyLevel: MediumLastUpdated: 26Oct,2021Prerequisite–IPv4DatagramFragmentationandDelays Fragmentationisdonebythenetworklayerwhenthemaximumsizeofdatagramisgreaterthanmaximumsizeofdatathatcanbeheldinaframei.e.,itsMaximumTransmissionUnit(MTU).Thenetworklayerdividesthedatagramreceivedfromthetransportlayerintofragmentssothatdataflowisnotdisrupted.  Sincethereare16bitsfortotallengthinIPheaderso,themaximumsizeofIPdatagram=216–1=65,535bytes.  Itisdonebythenetworklayeratthedestinationsideandisusuallydoneatrouters.Sourcesidedoesnotrequirefragmentationduetowise(good)segmentationbytransportlayeri.e.insteadofdoingsegmentationatthetransportlayerandfragmentationatthenetworklayer,thetransportlayerlooksatdatagramdatalimitandframedatalimitanddoessegmentationinsuchawaythatresultingdatacaneasilyfitinaframewithouttheneedoffragmentation.Receiveridentifiestheframewiththeidentification(16bits)fieldintheIPheader.Eachfragmentofaframehasthesameidentificationnumber.Receiveridentifiesthesequenceofframesusingthefragmentoffset(13bits)fieldintheIPheaderOverheadatthenetworklayerispresentduetotheextraheaderintroducedduetofragmentation.FieldsinIPheaderforfragmentation–Identification(16bits)–usetoidentifyfragmentsofthesameframe.Fragmentoffset(13bits)–usetoidentifythesequenceoffragmentsintheframe.Itgenerallyindicatesanumberofdatabytesprecedingoraheadofthefragment. Maximumfragmentoffsetpossible=(65535–20) =65515 {where65535isthemaximumsizeofdatagramand20istheminimumsizeofIPheader} So,weneedceil(log265515)=16bitsforafragmentoffsetbutthefragmentoffsetfieldhasonly13bits.So,torepresentefficientlyweneedtoscaledownthefragmentoffsetfieldby216/213=8whichactsasascalingfactor.Hence,allfragmentsexceptthelastfragmentshouldhavedatainmultiplesof8sothatfragmentoffset∈N.Morefragments(MF=1bit)–tellsifmorefragmentsareaheadofthisfragmenti.e.ifMF=1,morefragmentsareaheadofthisfragmentandifMF=0,itisthelastfragment.Don’tfragment(DF=1bit)–ifwedon’twantthepackettobefragmentedthenDFisseti.e.DF=1.ReassemblyofFragments–Ittakesplaceonlyatthedestinationandnotatrouterssincepacketstakeanindependentpath(datagrampacketswitching),soallmaynotmeetatarouterandhenceaneedoffragmentationmayariseagain.Thefragmentsmayarriveoutoforderalso.   Algorithm–DestinationshouldidentifythatdatagramisfragmentedfromMF,Fragmentoffsetfield.DestinationshouldidentifyallfragmentsbelongingtosamedatagramfromIdentificationfield.Identifythe1stfragment(offset=0).Identifysubsequentfragmentsusingheaderlength,fragmentoffset.RepeatuntilMF=0.Efficiency–Efficiency(e)=useful/total=(Datawithoutheader)/(Datawithheader)  Throughput=e*B{whereBisbottleneckbandwidth}  Example–AnIProuterwithaMaximumTransmissionUnit(MTU)of200byteshasreceivedanIPpacketofsize520byteswithanIPheaderoflength20bytes.ThevaluesoftherelevantfieldsintheIPheader. Explanation–SinceMTUis200bytesand20bytesisheadersizeso,themaximumlengthofdata=180bytesbutitcan’tberepresentedinfragmentoffsetsinceitisnotdivisibleby8so,themaximumlengthofdatafeasible=176bytes. Numberoffragments=(520/200)=3. Headerlength=5(sincescalingfactoris4therefore,20/4=5) Efficiency,e=(Datawithoutheader)/(Datawithheader)=500/560=89.2%    GATEPracticequestion– GATECS2013|Question65GATE-CS-2014-(Set-3)|Question38GATE-CS-2015(Set2)|Question65GATE-CS-2016(Set1)|Question63GATECS2018|Question37  MyPersonalNotes arrow_drop_upSave LikePreviousIPv4DatagramFragmentationandDelaysNext InternetProtocolversion6(IPv6)RecommendedArticlesPage:20,May1927,Aug1912,Jun1806,Jul1520,May2018,Aug2024,Sep1901,Feb2217,Aug1507,May1801,Apr2009,Jun2013,Sep1723,May1922,May2014,Aug2018,Aug2002,Feb2103,Feb1701,Aug1710,Oct1711,Jan1828,Mar1815,Jan19ArticleContributedBy:Ankit87@Ankit87VotefordifficultyCurrentdifficulty: MediumEasy Normal Medium Hard ExpertImprovedBy:coder45gpavanpal25878543anurag219tiwariPushpender007ArticleTags:ComputerNetworksGATECSTechnicalScripterPracticeTags:ComputerNetworksReportIssueWritingcodeincomment? Pleaseuseide.geeksforgeeks.org, generatelinkandsharethelinkhere. LoadCommentsWhat'sNewViewDetailsViewDetailsViewDetailsMostpopularinComputerNetworksCaesarCipherinCryptographySocketProgramminginPythonUDPServer-ClientimplementationinCSocketProgramminginJavaSimpleChatRoomusingPythonMostvisitedinGATECSTypesofOperatingSystemsACIDPropertiesinDBMSCaesarCipherinCryptographyNormalFormsinDBMSLRUCacheImplementation× Weusecookiestoensureyouhavethebestbrowsingexperienceonourwebsite.Byusingoursite,you acknowledgethatyouhavereadandunderstoodour CookiePolicy& PrivacyPolicy GotIt! StartYourCodingJourneyNow!Login Register



請為這篇文章評分?