Question

In: Computer Science

respond to the summaries posted please Methods for Reliable Data Transfers Checksum - Used to detect...

respond to the summaries posted please

Methods for Reliable Data Transfers

  • Checksum - Used to detect bit errors in a transmitted packet.
  • Timer - Used to timeout or re-transmit a packet if the packet or ACK was lost. Timeouts can happen when a packet is delayed, but not lost (also known as a premature timeout), or when a packet has been received but an ACK is lost.
  • Sequence number (seq. no.) - Used for sequential numbering of packets of data flowing from sender to receiver. Gaps in the sequence numbers of received packets allow the receiver to detect a lost packet. Packets with duplicate sequence numbers allow the receiver to detect duplicate copies of a packet.
  • Acknowledgement (ack) - Used by the receiver to tell the sender that a packet or set of packets has been received correctly. ACKs may be individual or cumulative, depending on the protocol.
  • Negative acknowledgement (nack) - Used by the receiver to tell the sender that a packet has not been received correctly. Nacks will carry the sequence number of the packet that was not received correctly.
  • Window (or pipelining) - Sender may be restricted to only send packets within sequence numbers of a given range. By allowing multiple packets to be transmitted, but not yet acked, sender utilization can be increased over a "stop-and-wait" mode of operation.

Solutions

Expert Solution

Transport Layer

The network layer (layer 3 of the OSI stack) is responsible for machine-to-machine communication. The transport layer, one layer higher (layer 4), provides logical communication channels between applications. An application can create an arbitrary number of these channels, each of which has another endpoint on some process running on some host. Writing data onto this channel delivers it to the application that is reading data on the other end of this channel. The transport layer is responsible for implementing this abstraction. Routers in the network are unaware of this concept since they only provide network layer (machine-to-machine) services.

There are multiple transport protocols available on top of IP, including TCP, UDP, and SCTP. TCP and UDP are by far the most popular of these. Two responsibilities of the transport layer are multiplexing and demultiplexing communication channels on the network and, in some cases, implementing reliable data transfer.

Incidentally, a packet at the transport layer is called a segment; it is called a datagram at the network layer and a frame at the datalink layer. We send Ethernet frames, which contain datagrams that are routed by routers. These datagrams, in turn, contain segments that the transport layer of the operating system’s network stack processes.

Transport layer multiplexing and demultiplexing

Multiplexing and demultiplexing are the software mechanisms in place to combine data from multiple logical communication channels on a machine into a single stream of packets on the network and then separate a stream of incoming datagrams into the appropriate communication channels. This is important since communication on multiple sockets shares the same network connection. We can have multiple distinct streams at the transport layer that appear as a single stream of data to the network layer.

Multiplexing is the process of taking data from multiple communication channels (sockets) and sending it out of the machine as a stream of datagrams. Demultiplexing is the opposite process: separating the incoming stream of datagrams into the individual messages for the individual sockets to which each segment is targeted.

The key to IP transport layer multiplexing and demultiplexing is the use of port numbers. Each transport layer segment contains source and destination port numbers. A port number is a 16-bit number that has a unique association to a socket (a communication endpoint) on each host. Naming a socket, also known as binding, is the process of associating a socket with a specific port number and address. The address is the local host’s IP address, of course. In the case where a host has several network interfaces, it will have that many IP addresses and it is possible to make the socket available on only one of these interfaces. More commonly, though, a special address, INADDR_ANY, is used to associate a socket with all available network interfaces. Port numbers are usually specified explicitly for server programs since clients will need to know where to contact them. For example, an SMTP mail server will typically listen for client connections on TCP port 25. A client, on the other hand, will generally not care what port it uses and specifying port 0 is a request for the operating system to pick any available unused port number.


Related Solutions

Second, the researcher wishes to use graphical descriptive methods to present summaries of the data on...
Second, the researcher wishes to use graphical descriptive methods to present summaries of the data on each of the two variables: hours worked per week and income earned per year, as stored in HOURSWORKED63 worksheet. (a) The number of observations (n) is 63 individuals. The researcher suggests using 7 class intervals to construct a histogram for each variable. Explain how the researcher would have decided on the number of class intervals (K) as 7. Data of HOURSWORKED63 Excel spraedsheet is...
Please respond to the summaries: 6-8 sentences each You are launching a new company that established...
Please respond to the summaries: 6-8 sentences each You are launching a new company that established its manufacturing operations recently, and you team is struggling to ramp-up it output. Might you consider a strategic alliance? Why? What are the advantages of integrating suppliers into the product design process as part of a strategic alliances? What are the risks?
"Self Constructed Assets and Nonreciprocal Transfers" Please respond to the following: Imagine you are the senior...
"Self Constructed Assets and Nonreciprocal Transfers" Please respond to the following: Imagine you are the senior accountant in the Fixed Assets department at your organization, and management is undecided as to whether it should construct its fixed assets or purchase such assets from an outside source. You are responsible for preparing a report to management, highlighting the advantages and disadvantages of self-constructed assets. Suggest to management two (2) advantages of purchasing the assets from an outside organization, as opposed to...
Describe the various methods used to detect the presence of drugs in the body, i.e. drug...
Describe the various methods used to detect the presence of drugs in the body, i.e. drug testing, and detail the strenghts and weaknesses of each method.
Please do answer this...have posted it serval time and haven't gotten a respond Write a report...
Please do answer this...have posted it serval time and haven't gotten a respond Write a report about any experience you had through any internship, typed, double‐spaced, respond to the below questions and sections: 1. What activities and experiences did you have that relate to your internship goals? 2. What other important activities and experiences did you have during this report period that did not relate to your internship goals? 3. What progress did you make with your major tasks/project during...
(a) DCPIP was used to detect the activity of Succinate Dehydrogenase (SDH). Please explain the principle...
(a) DCPIP was used to detect the activity of Succinate Dehydrogenase (SDH). Please explain the principle of this detection method. (b) Auto-oxidation is the spontaneous oxidation of a compound in the presence of oxygen. DCPIP undergoes auto-oxidation during the experiment, which may result in inaccurate results. Please highlight the appropriate items in the list below (a wrong choice will lead to a negative mark) and revise the current experimental protocol. You should clearly explain the reason(s) of choosing each item...
This is the third time I've posted this... please answer it. 1. Use the data from...
This is the third time I've posted this... please answer it. 1. Use the data from the file economic risk attached to answer the following: a. How does a 1% change in the exchange rate for the Brazilian real affect the price of the stock? b. Is the relationship between the changes in the value of the real and returns on the stock statistically significant? Explain how you determine this. c. If an investor owning stock in the company were...
Anomaly Dection For avoiding false discoveries, data mining introduces many statistical testing methods to define reliable...
Anomaly Dection For avoiding false discoveries, data mining introduces many statistical testing methods to define reliable data mining results. Select at least two statistical methods and discuss how they find unreliable patterns and relationship in the data mining results. Also, you have to mention how these methods can be applied to typical data mining tasks to help ensure that the resulting models and patterns are valid Need 300 words with no plagrism
"Accounting Methods and Inventories" Please respond to the following: Using the Internet or Strayer databases, research...
"Accounting Methods and Inventories" Please respond to the following: Using the Internet or Strayer databases, research an example of fraud by inventory misstatement for a public company in the last five (5) years. Next, explain this incident, including the particulars of how the fraud was achieved and how it was detected. Research clearly shows that whistleblowers are the best detection method. Explain the role whistleblowers played in the fraud example you selected previously, or how a whistleblower would have enhanced...
Debate It"  Please respond to the following: Absorption costing and other methods make it possible to manipulate...
Debate It"  Please respond to the following: Absorption costing and other methods make it possible to manipulate operating income raising some serious ethical concerns. Construct an argument either for or against the use of absorption costing (or similar methods) in terms of its ethical ramifications.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT