1.Suppose the network layer provides the complying with service. The network class in the resource host accepts a segment that maximum size 1,200 bytes and a location host address from the carry layer. The network layer then assures to provide the segment come the carry layer at the location host. Suppose plenty of network application processes can be to run at the destination host.a. Style the simplest possible transport-layer protocol the will obtain application data come the desired procedure at the destination host. I think the operating mechanism in the destination host has actually assigned a 4-byte port number to every running application process.

You are watching: Describe why an application developer might choose to run an application over udp rather than tcp.


a) speak to this protocol simple Transport Protocol (STP). In ~ the sender side, STP accepts indigenous the sending procedure a chunk of data no exceeding 1196 bytes, a destination host address, and a location port number. STP add to a four-byte header to every chunk and also puts the port variety of the destination process in this header. STP then offers the location host attend to and the resulting segment to the network layer. The network layer delivers the segment to STP at the destination host. STP then examines the port number in the segment, extracts the data from the segment, and also passes the data come the process identified by the port number.
1.Suppose the network layer offers the adhering to service. The network layer in the source host accepts a segment that maximum dimension 1,200 bytes and a destination host address from the move layer. The network layer then promises to deliver the segment come the transfer layer in ~ the location host. Suppose numerous network application processes can be to run at the destination host.b. Change this protocol so that it gives a "return address" come the location process.
The segment now has two header fields: a source port field and destination harbor field. In ~ the sender side, STP accepts a chunk the data not exceeding 1192 bytes, a location host address, a source port number, and a location port number. STP create a segment which includes the application data, resource port number, and destination harbor number. It then offers the segment and the location host address to the network layer. After receiving the segment, STP in ~ the receiving host gives the application process the applications data and also the resource port number.
Suppose the network layer offers the following service. The network layer in the source host accepts a segment of maximum size 1,200 bytes and also a destination host attend to from the transport layer. The network layer then assures to supply the segment to the move layer in ~ the location host. Suppose countless network applications processes have the right to be to run at the location host.In your protocols, go the move layer "have to do anything" in the core of the computer network?
No, the move layer walk not need to do anything in the core; the transport layer "lives" in the end systems.
2. Take into consideration a planet where anyone belongs come a household of six, every family members lives in its very own house, every house has a distinctive address, and also each person in a offered house has actually a distinct name. Intend this planet has actually a mail business that delivers letters from source house to location house. The mail company requires the (1) the letter be in an envelope, and that (2) the attend to of the location house (and nothing more) be plainly written on the envelope. Sup- posture each household has a delegate family member who collects and distributes letter for the other household members. The letters carry out not necessarily administer any clues of the recipients of the letters.a. Making use of the solution to trouble R1 over as inspiration, define a protocol that the delegates have the right to use to supply letters native a sending family member to a receiving family members member. B. In her protocol, go the mail service ever have to open the envelope and examine the letter in bespeak to provide its service?
For sending out a letter, the family member is forced to give the delegate the letter itself, the deal with of the location house, and also the surname of the recipient. The delegate plainly writes the recipient"s surname on the top of the letter. The delegate then puts the letter in one envelope and also writes the resolve of the location house on the envelope. The delegate then gives the letter come the planet"s mail service. At the receiving side, the delegate receive the letter from the letter service, take away the letter out of the envelope, and takes keep in mind of the receiver name created at the peak of the letter. The delegate then provides the letter to the family members member through this name.
2. Think about a world where anyone belongs come a family members of six, every household lives in its own house, each house has a distinct address, and also each person in a provided house has actually a distinctive name. Expect this planet has actually a mail service that delivers letter from resource house to location house. The mail service requires that (1) the letter it is in in an envelope, and that (2) the address of the location house (and nothing more) be clearly written ~ above the envelope. Sup- posture each household has a delegate family members member who collects and distributes letter for the other family members members. The letters perform not necessarily carry out any indication of the recipients the the letters.b. In your protocol, go the mail company ever need to open the envelope and examine the letter in order to carry out its service?
No, the mail service does not need to open the envelope; it just examines the resolve on the envelope.
3. Think about a TCP connection in between Host A and Host B. Intend that the TCP segments traveling from host A to hold B have resource port number x and also destination port number y. What space the resource and location port numbers for the segment traveling from hold B to organize A?
4. Describe why an application developer might choose to operation an application over UDP rather than TCP.
An application developer may not desire its applications to use TCP"s jam control, which have the right to throttle the application"s sending price at time of congestion. Often, designers of IP telephony and IP videoconference applications pick to operation their applications end UDP because they desire to prevent TCP"s jam control. Also, some applications execute not require the dependable data transfer provided by TCP.
5. Why is it that voice and video clip traffic is regularly sent end TCP fairly than UDP in today"s Internet? (Hint: The prize we space looking for has actually nothing to execute with TCP"s congestion-control mechanism.)
Since most firewalls space configured to block UDP traffic, making use of TCP for video clip and voice traffic lets the web traffic though the firewalls.
6. Is it possible for an application to gain reliable data transfer also when the application runs over UDP? If so, how?
Yes. The applications developer have the right to put trusted data transfer into the application layer protocol. This would call for a significant amount that work and debugging, however.
7. Suppose a process in hold C has actually a UDP socket with port number 6789. Sup- posture both organize A and Host B each send a UDP segment to host C with destination port number 6789. Will certainly both of this segments be directed to the exact same socket at organize C? If so, how will the process at host C know that these 2 segments originated from two various hosts?
Yes, both segments will be command to the very same socket. Because that each received segment, at the socket interface, the operating system will carry out the procedure with the IP addresses to identify the beginnings of the individual segments.
Sequence numbers are required for a receiver to uncover out whether an showing up packet contains new data or is a retransmission.
To manage losses in the channel. If the ACK for a sent packet is not got within the expression of the timer because that the packet, the packet (or its ACK or NACK) is suspect to have actually been lost. Hence, the packet is retransmitted
10. Expect that the roundtrip hold-up between sender and receiver is consistent and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming the packets can be lost? Explain.
A timer would certainly still be crucial in the protocol rdt 3.0. If the round pilgrimage time is known then the only benefit will it is in that, the sender to know for sure that one of two people the packet or the ACK (or NACK) for the packet has been lost, as compared to the genuine scenario, whereby the ACK (or NACK) might still be on the means to the sender, after the timer expires. However, to detect the loss, for each packet, a timer of constant duration will still be vital at the sender.
True or false?a. Organize A is sending organize B a large record over a TCP connection. Assume organize B has actually no data to send hold A. Organize B will certainly not send acknowledgments to host A due to the fact that Host B cannot piggyback the acknowledgments on data.
False
True or False?b. The dimension of the TCP rwnd never transforms throughout the duration of the connection.
False
True or False?c. Suppose hold A is sending organize B a large document over a TCP connection. The variety of unacknowledged bytes the A sends cannot exceed the dimension of the obtain buffer.
True or False?Suppose host A is sending out a large paper to hold B end a TCP connection. If the succession number for a segment of this link is m, climate the sequence number because that the subsequent segment will necessarily be m + 1.
False
True or False? The TCP segment has actually a ar in the header because that rwnd
True
True or False?Suppose that the last Sample RTT in a TCP connection is same to 1 sec. The present value the TimeoutInterval because that the link will have to be ≥ 1 sec.
True or False?Suppose organize A sends out one segment through sequence number 38 and 4 bytes the data over a TCP connection to host B. In this very same segment the acknowledgment number is have to 42.

See more: Exam 3 Fl As A Youth, Franz Liszt Was Influenced By The Performances Of


14. Suppose host A sends out two TCP segments ago to ago to host B end a TCP connection. The an initial segment has actually sequence number 90; the second has sequence number 110. A. How much data is in the an initial segment?
14. Suppose hold A sends out two TCP segments ago to ago to host B end a TCP connection. The first segment has actually sequence number 90; the second has succession number 110. B. Intend that the very first segment is lost however the 2nd segment arrives at B. In the acknowledgment that host B sends out to organize A, what will certainly be the acknowledgment number?
15. Expect two TCP relations are present over part bottleneck link of rate R bps. Both connections have a huge paper to send (in the very same direction over the bottleneck link). The transmissions that the papers start at the same time. What transmission rate would TCP choose to give to each of the connections?
16. True or false? consider congestion regulate in TCP. As soon as the timer expires in ~ the sender, the worth of ssthresh is collection to one half of its ahead value.
})}else;window.location.assign("https://brickandmortarphilly.com/explanations/textbook-solutions/computer-organization-and-design-mips-edition-the-hardwaresoftware-interface-5th-edition-9780124077263");">
*

Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, john L. Hennessy
})}else;window.location.assign("https://brickandmortarphilly.com/explanations/textbook-solutions/introduction-to-the-theory-of-computation-3rd-edition-9781133187790");">
*

})}else;window.location.assign("https://brickandmortarphilly.com/explanations/textbook-solutions/introduction-to-algorithms-3rd-edition-9780262033848");">

Introduction come Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, thomas H. Cormen
})}else;window.location.assign("https://brickandmortarphilly.com/explanations/textbook-solutions/operating-system-concepts-8th-edition-9780470128725");">
*

Operating device Concepts8th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
309 explanations
Sets found in the same folder
window.brickandmortarphilly.com<"productClickLinkData"> = <"name":"IST 220 test 1","id":"37516330","price":"","category":"premium content","variant":"study guide","position":"","brand":"Smithzo6221">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;})}elsewindow.brickandmortarphilly.com<"productClickLinkData"> = <"name":"IST 220 exam 1","id":"37516330","price":"","category":"premium content","variant":"study guide","position":"","brand":"Smithzo6221">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;;window.location.assign("https://brickandmortarphilly.com/37516330/ist-220-exam-1-flash-cards/");" id="1-37516330">
IST 220 test 1
87 terms
Smithzo6221
window.brickandmortarphilly.com<"productClickLinkData"> = <"name":"Computer Networking chapter 3 testimonial Questions","id":"55365749","price":"","category":"premium content","variant":"study guide","position":"","brand":"theleadzeppelin">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;})}elsewindow.brickandmortarphilly.com<"productClickLinkData"> = <"name":"Computer Networking thing 3 review Questions","id":"55365749","price":"","category":"premium content","variant":"study guide","position":"","brand":"theleadzeppelin">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;;window.location.assign("https://brickandmortarphilly.com/55365749/computer-networking-chapter-3-review-questions-flash-cards/");" id="1-55365749">
Computer Networking thing 3 testimonial Questions
19 terms
theleadzeppelin
window.brickandmortarphilly.com<"productClickLinkData"> = <"name":"networking Quiz 3","id":"97886927","price":"","category":"premium content","variant":"study guide","position":"","brand":"Moisha_Cheburashka">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;})}elsewindow.brickandmortarphilly.com<"productClickLinkData"> = <"name":"networking Quiz 3","id":"97886927","price":"","category":"premium content","variant":"study guide","position":"","brand":"Moisha_Cheburashka">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;;window.location.assign("https://brickandmortarphilly.com/97886927/networking-quiz-3-flash-cards/");" id="1-97886927">
networking Quiz 3
25 terms
Moisha_Cheburashka
window.brickandmortarphilly.com<"productClickLinkData"> = <"name":"Chapter 3","id":"216259219","price":"","category":"premium content","variant":"study guide","position":"","brand":"rosa_pratt">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;})}elsewindow.brickandmortarphilly.com<"productClickLinkData"> = <"name":"Chapter 3","id":"216259219","price":"","category":"premium content","variant":"study guide","position":"","brand":"rosa_pratt">; QLoad("brickandmortarphilly.com.productClickLinkData"); return;;window.location.assign("https://brickandmortarphilly.com/216259219/chapter-3-flash-cards/");" id="1-216259219">