Question

In: Computer Science

At Transport layer of Networks, we use segments to send data across. 1. Argue for using...

At Transport layer of Networks, we use segments to send data across.

1. Argue for using larger segments by discussing briefly why larger segments could be beneficial.

2. Then also argue why using small segments may be beneficial.

Solutions

Expert Solution

At the Transport layer of Networks, data is sent across in segments. In fact, the data packets are segmented in smaller units to transmit over the network.

1) Argue for using larger segments by discussing briefly why larger segments could be beneficial.
* Using larger segments or datagrams could be beneficial when large amounts of data need to be transmitted all at once or in very fewer segments, taking chances or risks, considering the fact the network is unreliable, and data (large amounts of data due to larger segments), could be lost.

* This could be beneficial when a TCP application at the sender end wants to write multiple data blocks in sequence attempting to use the largest segment size it can for the data transfer into the network connection, however within the limits of the receiver's maximum segment size, the configured sender's maximum segment size, and the network path's maximum supportable non-fragmented packet size i.e., path Maximum Transmission Unit (MTU), the remote reader or the receiver receives these multiple data blocks in a single read operation.

2) Then also argue why using small segments may be beneficial.
* Using small segments or datagrams may be beneficial because, when the data packets are larger than the supported Maximum Transmission Unit (MTU) by the network.
* When the network becomes unreliable, data segments sent across can be lost, especially when larger data segments are sent, and when they are lost, large amounts of data are lost.
* Smaller data segments each called Protocol Data Units (PDUs) are encapsulated into packets. These packets are sent on multiple paths to the destination increasing reliability and speed of the data traveling across a network.
* Loss of any single packet can be retransmitted.

Hence, it is recommended to divide the data or information into smaller segments to increase the chances or probability of every small data segments delivering correctly to the destination, and even if these data segments are lost, not many of these small data segments would be lost all at once. Hence, losing only a small amount of data or information in turn.


Related Solutions

A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
What controls must be used to protect data that is transmitted across wireless networks?
What controls must be used to protect data that is transmitted across wireless networks?
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1) A company that wants to send data over the Internet will use an encryption program...
1) A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. Multi-layer BP neural networks have no proof of converging to an optimal solution. Is this...
1. Multi-layer BP neural networks have no proof of converging to an optimal solution. Is this true? If it is, then why do we bother to use them? 1. What is the fundamental equation that guides changes to a weight wij in a BP network. Describe its components.
If two applications use TCP to send data but only send 10 bytes per segment (e.g....
If two applications use TCP to send data but only send 10 bytes per segment (e.g. by using the push operation), what is the maximum percent of the network bandwidth they will have for their data?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT