Explain different strategies-transfer file between computers

Assignment Help Computer Networking
Reference no: EM1371844

When transferring a file between two computers, (at least) two acknowledgment strategies are possible. In the first one, the file is chopped up into packets , which are individually acknowledged by the receiver, but the file transfer as a whole is not acknowledged. In the second strategy, the packets are not acknowledged individually, but the entire file is acknowledged when it arrives. Discuss the two approaches.

Reference no: EM1371844

Questions Cloud

What routing protocol is suitable for retail customer : What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.
Practice of tipping : In most restaurants, waiters receive a big portion of their compensation through tips from customers. Generally, the size of the tip is decided by the customer. However, many restaurants require a 15 percent tip for parties of eight or more.
Determining total cost problem-cost per unit : Company A plans to produce 300,000 units next year, the production budget is: Compute the total cost and cost per unit when the unit production is changed to 315,000 units.
Financial impact of outsourcing the grounds maintenance : College A is planning outsourcing their groundskeeping. They have been given a bid from Groundskeeper Willie for $250,000 a year, with the claim that he will keep school grounds in the same condition they are in now.
Explain different strategies-transfer file between computers : In second strategy, packets are not acknowledged individually, but whole file is acknowledged when it arrives. Explain the two approaches.
Decrease in price of access : The steady increase in demand for home computers has resulted in the massive increase in demand for web access, yet, the price of access has been steadily declining.
Attributes of new economy : Supposing a products is produced both in the US and abroad what would be the effects of the US import quota on the good? Discuss some of the attributes of the new economy.
Computing payback period, present worth and irr : As the manager of exploration for Chieftain Oil & Gas, you are  assessing    a new offshore oil recovery method that will recover oil and gas deep in the Gulf of Mexico.
Calculating higher data rate in atm line : Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

Reviews

Write a Review

Computer Networking Questions & Answers

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

  Sketching lan with operation over a distance

You have been asked to sketch a LAN with operation over a distance of about 100m.

  Explaining algorithm which uses sequence numbers

Assume that sender sends silence suppressed RTP stream of G.711 audio to receiver (G.711 is the name of standard for 64Kbps PCM). Outline algorithm which uses sequence numbers and time stamps of RTP packets to find out beginning of new talk spurt?

  Maximum size of file-tcp sequence numbers are not exhausted

Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

  Distinguish between any web pages or web servers

Suppose the role of IT consultant to new nonprofit organization, Free Flu, which gives flu shots to elderly. Distinguish between any Web pages or Web servers you would use for this task.

  Several network connections in the operation

By using a laptop computer along with a wireless connection into company’s local area network, you download a Web page from Internet. State all several network connections involved within this operation.

  Create technique to establish tcp connection

Try to create a technique which will allow Arnold to establish a TCP connection with Bernard without application-specific NAT configuration. If you have difficulty devising such technique, explain why.

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

  Install backbone to connect four base-t ethernet lans

You have been hired by a small company to install backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to give a connection to Internet. Develop simple backbone and determine total cost.

  Business processes ultimately drive type of cable media

Business processes and needs ultimately drive the type of cable media and hardware you select. What factors might determine how we select which ones are appropriate for our organization?

  Represent the encryption of plaintext with key using des

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Prove that y' = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented).

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd