Preview

Nt1310 Unit 7 Gdp

Good Essays
Open Document
Open Document
311 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Gdp
There are a few problems I would anticipate with using this combination of protocols. The first is if there is some sort of failure with the delivery of the sequence of data packets. As UDP is connectionless there isn’t a reliable order that the packets will arrive, one would assume this is why they are using stop and wait, to try and compensate for this issue. As a result, you may get some packets timing out and being resent by the server causing duplicate packets to be sent, all while awaiting ACK arrival even though there may not have actually been any failure. Then there are extra packets on the network trying to arrive while this is occurring. These duplicate packets, or duplicate ACKs, need to be handled in order to keep the file transfer from becoming exponentially larger each time there was some sort of issue. …show more content…

As UDP doesn’t implement any error control the file could potentially be corrupted when it arrives and be accepted, or just discarded. Using stop and wait, if the packet is discarded, it could be resubmitted by the server when it times out causing an issue similar to the one noted above. However, as the data isn’t sequenced, if it is accepted, this could potentially cause unintended results in the file being read correctly. This sequencing issue could also be an issue if there are multiple “sets” of packets arriving at intermittent intervals. Some sort of protocol would need to be used to either correctly sequence packets as they leave and arrive and handle any errors correctly.
It would seem like the ideal thing to do for a file transfer would be to instead use TCP to remove several of the issues that you’re trying to compensate for by using the stop and wait with


You May Also Find These Documents Helpful

  • Good Essays

    The project contains two parts, photogrammetric survey, and GIS analysis. The photogrammetric survey part was done by Agisoft photoscan software. This kind of survey is desired in many fields, such as Archeology field. This is because of the tendency of collapsing in Archeology’s targets. On the other hand, ArcMap and ArcScene are responsible for the data analysis part. With GIS, the complexity of the 3D data can be simplified, the data can be interpreted, and new data can be generated. Plus, we can comfortably work on improving our model by digitizing, coloring, outlining, and updating data even after we finish the project.…

    • 909 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1110 Unit 3 Assignment

    • 655 Words
    • 3 Pages

    Here, Raspberry Pi will act as a server which will open a socket on a specified port which will wait for the incoming connection from the client machine once the connection is established it will send and receive messages and the connection will termi-nate only when the client side application exits. As mentioned earlier it is similar to a simple chat server where the client ma-chine will send some instructions as messages and the Pi will send acknowledgment or error message as message only. One thing that should be kept in mind here is that in the case of an error the server side code should not terminate. Now from here code can be further divided into five parts i.e.:…

    • 655 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Visual Promethee main window is displayed that uses a typical spreadsheet to manage the data of effectiveness multi-criteria problem (Figure 4.7). The main window contain all the data have related to the PROMETHEE method (preference function, statistics and evaluation, weights…), this information can be easily input and defined by the decision maker.in addition to that Visual PROMETEE can provide additional features like quantitative criteria as well as qualitative criteria. Besides Visual PROMETHEE software can also handle the definition of variable thresholds in the preference functions (q, p, s), can also…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 6: The destination device will update its ARP cache, since it need to contact the sender machine soon.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    UDP is a connectionless protocol, unlike TCP, so there is no feedback on whether a packet was received. When would this type of protocol be useful and what is the benefit of using it? Use your textbook and Internet research to draw your conclusions.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    The significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol is to ensure a connection is made before transmitting data such as SSH and HTTP. FTP, Telnet, HTTP, HTTPS, SMTP, POP3, IMAP, SSH use TCP as a transport protocol.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    TCP – TCP stands for “transmission control protocol” and it is the pieces that manages all movement of each data packet between computers. It establishes a connection between the computers. It also acknowledges that each packet have been…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Business

    • 429 Words
    • 2 Pages

    1. I would like to start a business that advises on and creates commercials and other video based advertising for other smaller businesses. With social media and online-video sharing being as large as it ever has been, less people are watching TV, local shop's commercials are not being seen. I want to help create commercials that will be able to rival larger companies and also advise those shops on what platforms will get them the most exposer to farther their business.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ISS 418 Lab 7 and 8

    • 1105 Words
    • 5 Pages

    The purpose of enabling syncookies in the Linux Kernel is to help prevent a type of DoS attack by dropping connection which can lead to additional SYN messages.…

    • 1105 Words
    • 5 Pages
    Powerful Essays