.

Monday, June 10, 2019

If all the links in the Internet were to provide reliable delivry Essay

If all the links in the Internet were to provide undeviating delivry service, would the TCP reliable delivery service be redundant, - Essay Example2007). For instance, if workstation 1 is downloading a file from Workstation 2, after receiving a data packet, computer 2 sends an acknowledgement for receiving a packet to workstation 1. However, if workstation 1 do not receives an acknowledgement from workstation 2, TCP regenerates the packet again and send it to Workstation 2. In this way, the transmission is reliable and data is transmitted an in efficient manner. In a real world scenario, an executable file that is downloaded from the Internet must be complete in size in order of battle to be operational and TCP is up for this task. Whereas, if any chunk of the executable file fails to download, it will not work and become corrupted. Whereas, User Datagram Protocol (UDP) a connection less protocol that is operational on a layer 4 of the OSI model. Likewise, UDP is not a reliable pro tocol for data transmission that supports work oriented services (User Datagram Protocol. 2007). However, UDP can be advantageous for finish such as live video streaming, VoIP services etc. likewise, if any frame is miss from a video, the video will still carry on resulting in high availability. Moreover, the response of UDP is faster, as no acknowledgment is made for every packet. many another(prenominal) of the functions of an adapter can be performed in software that runs on the nodes CPU. What are advantages and disadvantages of moving this functionality from the adapter to the node? As shown in common fig tree 1.1, data link layer pertaining to the sender is responsible for hardware encapsulation. However, the source end is responsible for hardware valuation. Similarly, network layer pertaining to the sender is responsible for execute Network address translation (NAT). NAT is a method of mapping IP addresses from one group of users to another, at the same time ensuring tr ansparency. Likewise, NAT is also used for cover issues i.e. it cannot be used from the outbound network for security purposes (Network Address Translation. 2007). Moreover, the receivers end on the network layer ensures network valuation, as shown in Fig 1.1. Moreover, the transport layer of both the sender and receivers end conducts port encapsulation and port valuation. Furthermore, session layer is responsible for establishing and terminating data sessions, followed by the presentation layer that ensures data compression and sequencing for both the senders and receivers end. However, there is a visible communication between the smallest chopine generating sequence and the amount of compression achieved (Sayood 2005) lastly, the presentation layer network interaction. Figure 1.1 A primary disadvantage comprises of computing a datagram from the application layer that relies on resources pertaining to central processing unit and memory integrated in a dedicated hardware i.e. Ethe rnet Adapter. However, an advantage would be to get more control of an application interacting with users that will work with dedicated hardware resulting in a complex task. Moreover, software approach is more efficient for upgrading technology, as hardware upgrades only train a hardware replacement. Likewise, new hardware upgrades provide adequate abstraction for ensuring user protection. As illustrated in Fig 1.1, software based deployments require a large amount of metadata to analyze the requirements. As network access layer enforces overheads

No comments:

Post a Comment