Question

In: Computer Science

Q # 1: Is it is possible for an application on top UDP to have a...

Q # 1: Is it is possible for an application on top UDP to have a reliable data transfer? explain?

Q # 2: Suppose you open a startup company “foo” and want to set up your company network. Your network has the following servers:

  • DNS server: “dns.foo.com” with IP as “140.111.30.40”
  • Web server: “foo.com” with two IP as “140.111.30.55” and “140.111.30.52”.
  • The web server also has a name as “www.foo.com”.
  • Email server: “galaxy.foo.com” with IP as “140.111.30.6”
  • Your company’s email address is “[email protected]”.

a) What resource records (RRs) do you need to provide to the upper-level “.com” Registrar?

b) What RRs do you need to put in your company’s DNS server?

Q #3: What are the two layers the run exclusively at the network edges?

Q #4: What are the differences between GET and GET conditional Http Requests?

Q #5: Would the DNS protocol work if IP addresses are not hierarchical? Explain why?

Q # 6: in P2P, each peer only upload chunks to a limited number of peers? Why is the Bit torrent designed in such a way?

****************** Please give me all answers *************

Solutions

Expert Solution

1.The UDP does not have a specific protocol layer that validates about the completion of transfer. UDP as a protocol is not meant for reliability. It is designed to develop applications which need speed rather than reliability. But its possible to add reliability at the application layer. If any packets have not received the application can send message to lower UDP layer and to other end need to re-transmit the packet.

There is nothing to stop the process of transferring a file by UDP and also it provides  a sum check on the source machine and its also possible to compute a sum check on the destination machine. It helps in recursive repeating of the file transfer until the source and destination matches.
  A minimum of three transfers can be done to separate destination files and compare the results. If the three files are different, but the differences are in different places of the  files, we can try creating a new file based on the majority verdict. However UDP does not guarantee delivery ,the three files can be of different lengths which can make matching up the good segments of the files tricky and can even  still leave errors.
   This approach has other overheads like managing sequence number of each packet on both client and server side and so on.

If we have a suitable application for both  sending and receiving, then these could provide their own verification on to the UDP layer.

UDP works well for streaming webcam or other similar devices, where it's probably more desirable to keep the stream flowing rather than waiting for TCP to sort out any missing packets. The problem with using TCP for this sort of application is that the transport service normally has to wait several seconds, when a packet is lost it can initiate a retry in order to prevent excessive duplication of packets when the original packet arrives slightly late. If we stream a webcam on occasional frame jumps, we probably won’t notice and we would simply accept it. Missing bytes in a data file will be unacceptable.
So eventually it is ease to use TCP rather than UDP, if reliability carries more importance.


Related Solutions

1) Is it possible to have zero pollution? If it is possible, would we want to...
1) Is it possible to have zero pollution? If it is possible, would we want to achieve zero pollution? Explain. (4-6 sentences) 2) Consider activities like smoking or talking on a cell phone while driving. What types of externalities are associated with these examples, and what do you think should be done about these behaviors (if anything)? (4-6 sentences)
At a local university, your application will only be considered if you score in the top...
At a local university, your application will only be considered if you score in the top 75% (better than at least 25% of the population) of all SAT scores. You score 428 on your SAT. You know that SAT scores are normally distributed, have µ = 500, and σ = 100. Based on this information, do you need to retake the test?
Q) explain an application that uses an outcome of optical activity experiment
Q) explain an application that uses an outcome of optical activity experiment
Which of the following is not an OWASP Top 10 Web Application Security Risk? Group of...
Which of the following is not an OWASP Top 10 Web Application Security Risk? Group of answer choices Broken access control Software maturity Insecure deserialization XML External Entities
You have been hired by a firm that produces two products, Q(1) and Q(2). As the...
You have been hired by a firm that produces two products, Q(1) and Q(2). As the economic consultant, the production function is: C(Q(1),Q(2)) = 4000 – 3Q(1)Q(2) + 2Q(1)2 + 3Q(2)2 and management has approached you for advice. a. First, management is considering increasing production of Q(2) in response to gaining access to a new market. If the firm does increase the production of Q(2) and holds the production of Q(1) constant, what is the impact of this decision on...
You have been hired by a firm that produces two products, Q(1) and Q(2). As the...
You have been hired by a firm that produces two products, Q(1) and Q(2). As the economic consultant, the production function is: C(Q(1),Q(2)) = 5000 – 2Q(1)Q(2) + 4Q(1)3 + 5Q(2)2 and management has approached you for advice. First, management is considering increasing production of Q(2) in response to gaining access to a new market. If the firm does increase the production of Q(2) and holds the production of Q(1) constant, what is the impact of this decision on the...
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit...
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 01110100. a) What is the 1s complement of the sum of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) b) Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? c) With...
True or False 1. A streaming video (UDP) from video server to a subscriber’s PC at...
True or False 1. A streaming video (UDP) from video server to a subscriber’s PC at 300 Kb/s capacity with download latency of 40 ms delay could be considered a bidirectional flow. 2. A transaction processing from point-of-sale machine to server with upstream data (from PoS machine to server) at 30 kb/s and downstream data at 50 kb/s assuming 100 ms round-trip delay is a bidirectional flow. 3. There are generally two flow models, composite and individual. 4. A storage...
1-Define UDP? 2-What voltage levels are used in RS232 to represent logic 0 and 1
1-Define UDP? 2-What voltage levels are used in RS232 to represent logic 0 and 1
In a baking competition between ten bakers, how many ways is it possible for the top...
In a baking competition between ten bakers, how many ways is it possible for the top three places, (1st -2nd - 3rd place) to be determined? In a class of twenty students, how many ways are there to choose two students to participate in a debate?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT