Monday, September 23, 2019
If all the links in the Internet were to provide reliable delivry Essay
If all the links in the Internet were to provide reliable delivry service, would the TCP reliable delivery service be redundant, - Essay Example 2007). For instance, if workstation 1 is downloading a file from Workstation 2, after receiving a data packet, computer 2 sends an acknowledgement for receiving a packet to workstation 1. However, if workstation 1 do not receives an acknowledgement from workstation 2, TCP regenerates the packet again and send it to Workstation 2. In this way, the transmission is reliable and data is transmitted an in efficient manner. In a real world scenario, an executable file that is downloaded from the Internet must be complete in size in order to be operational and TCP is up for this task. Whereas, if any chunk of the executable file fails to download, it will not work and become corrupted. Whereas, User Datagram Protocol (UDP) a connection less protocol that is operational on a layer 4 of the OSI model. Likewise, UDP is not a reliable protocol for data transmission that supports transaction oriented services (User Datagram Protocol. 2007). However, UDP can be advantageous for application such a s live video streaming, VoIP services etc. likewise, if any frame is missed from a video, the video will still carry on resulting in high availability. Moreover, the response of UDP is faster, as no acknowledgment is made for every packet. Many of the functions of an adapter can be performed in software that runs on the nodeââ¬â¢s CPU. What are advantages and disadvantages of moving this functionality from the adapter to the node? As shown in fig 1.1, data link layer pertaining to the sender is responsible for hardware encapsulation. However, the source end is responsible for hardware valuation. Similarly, network layer pertaining to the sender is responsible for performing Network address translation (NAT). NAT is a method of mapping IP addresses from one group of users to another, at the same time ensuring transparency. Likewise, NAT is also used for privacy issues i.e. it cannot be used from the outbound network for security purposes (Network Address Translation. 2007). Moreov er, the receiverââ¬â¢s end on the network layer ensures network valuation, as shown in Fig 1.1. Moreover, the transport layer of both the sender and receiverââ¬â¢s end conducts port encapsulation and port valuation. Furthermore, session layer is responsible for establishing and terminating data sessions, followed by the presentation layer that ensures data compression and sequencing for both the senderââ¬â¢s and receiverââ¬â¢s end. However, there is a visible communication between the smallest program generating sequence and the amount of compression achieved (Sayood 2005) lastly, the presentation layer network interaction. Figure 1.1 A primary disadvantage comprises of computing a datagram from the application layer that relies on resources pertaining to central processing unit and memory integrated in a dedicated hardware i.e. Ethernet Adapter. However, an advantage would be to get more control of an application interacting with users that will work with dedicated hard ware resulting in a complex task. Moreover, software approach is more efficient for upgrading technology, as hardware upgrades only require a hardware replacement. Likewise, new hardware upgrades provide adequate abstraction for ensuring user protection. As illustrated in Fig 1.1, software based deployments require a large amount of metadata to analyze the requirements. As network access layer enforces overheads
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.