Focus of reliability control, Computer Networking

Assignment Help:

Q. Focus of Reliability Control?

- Implementation of the OSI model puts emphasis on providing a reliable data transfer service while the TCP/IP model treats reliability as an end-to-end problem.

- Every layer of the OSI model detects and handles errors all data transmitted includes checksums. The transport layer of the OSI model checks source-to-destination reliability.

- In the TCP/IP model, reliability control is concentrated at the transport layer. The transport layer handles every error detection and recovery. The TCP/IP transport layer uses acknowledgments, checksums and timeouts to control transmissions and provides end-to-end verification.


Related Discussions:- Focus of reliability control

Matrix computation and multiplication, In the following section, we shall d...

In the following section, we shall discuss the algorithms for solving the matrix multiplication difficulty using the parallel models. Matrix Multiplication Problem Let ther

Unix for multiprocessor system, UNIX For Multiprocessor System:- The UN...

UNIX For Multiprocessor System:- The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let

Describe about radio waves, Radio Waves - Frequency ranges: 3 KHz to 1...

Radio Waves - Frequency ranges: 3 KHz to 1 GHz - Omni directional - Susceptible to interference by other antennas utilizing same frequency or band - Ideal for long-di

Explain about the gopher, Explain about the Gopher The ghoper is a prot...

Explain about the Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the  Internet. The Ghoper was formed as a piece of sof

Describe in detail with example how data fragmentation works, Describe in d...

Describe in detail with example how data fragmentation works?

Computes their distance vector for network, Consider the following network ...

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes. (a) Show the procedure of nod

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Differentiate between rarp and arp, TCP/IP Protocol Suite 1. What is th...

TCP/IP Protocol Suite 1. What is the concept of Multi-protocol encapsulation in ATM networks? 2. Differentiate between RARP and ARP. 3. Differentiate TDP and UDP. 4. D

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd