Question

- If you were to design a new application layer protocol to stream videos over the...

- If you were to design a new application layer protocol to stream videos over the Internet, what transport layer protocol would you use, and why? What are the features of that protocol that make it suitable for your purpose?

- From application layer to physical layer and back again, explain the process that a single packet message goes through to get encapsulated? What information is added at each layer. Clarify your assumptions. Is this an IPv4 or v6 network, or some other protocol entirely? On the receiving end, what, if anything, does each layer do or look for as it receives a packet?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Ans: - TCP protocol is used to transfer data from source to destination. Data is divided into the smaller pieces called packets. If there is a need to design an application layer protocol for streaming videos then HTTP based protocols are used to do the same. These protocols are present in Application layer of the Transmission control protocol.

As in this modern age online video streaming platforms have become the most useful source for accessing any type of information. Because video contents could be easier to understand as compare to text.

Real Time Streaming Protocol (RTSP) is the HTTP based protocol in the Application layer of TCP protocol which can be used to transmit the live data streaming from source to destination. It also used the user datagram protocol and transmission control protocol for streaming purposes.

Features of RTSP :-

RTSP is a transport protocol which is used to transfer data consist of This protocol has MP3, MP4, AAC, AAC-LC, Opus and Vorbis Audio codecs and H.265 H.264, VP9, VP8 video codecs.

This can use both UDP and TCP for data transmission.

It has high fault tolerance which decrease the rate of failure in transmission of the data.

It is highly scalable which provide the feature of publish the large subscribers userbase.

The best advantage of this protocol is that it has Low-latency. Latency is the delay before the transmission of data or information. There is no requirement of buffering. So that this protocol can be of best use to stream online videos.

Data Encapsulation process: -

How the data travels from the application to physical layer or over the whole TCP suite.

Application layer of TCP displays the actual data which the end user sees. Physical layer defines the hardware structure of network.

Firstly, the data is converted into small packets and these packets are transferred over the different layers using the various addressing techniques. To check whether the data sent by the sender has reached its destination different error and flow control methods are used. Data should reach the destination in the same form as it was sent by the sender.

At application layer the user initiates the communication process by sending the data. Then at Transport layer data gets encapsulate in the following steps: - TCP Segmentation, the transport layer receives the data sent by application layers as an input. The received data is divided into segments, each segment has header assigned to it. Then the TCP connection is established by using the ACK (Acknowledgement) and NACK (Negative Acknowledgement). When data is successfully received by the receiver it sends ACK message which is positive acknowledgement otherwise it sends negative acknowledgement. UDP protocol coverts the arrived data into UDP packets and then forward it to internet layer. At IP layer the data is converted into frames by the IP datagram. Then the data received by the physical as input from IP layer and establish it over the network media.

This network uses IPv6 protocol fro addressing the data information.

Add a comment
Know the answer?
Add Answer to:
- If you were to design a new application layer protocol to stream videos over the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • You are designing a reliable byte stream transport layer protocol (not TCP) to operate over a...

    You are designing a reliable byte stream transport layer protocol (not TCP) to operate over a 1x107 bps network and it is using a sliding window for flow control. The time for keeping the transmission pipe full is taken to be the RTT of the network which is 50ms. Each number in the advertised window or sequence number represents 2 bytes of data. a) What is the minimum number of bits necessary for the Advertised Window field of your protocol...

  • seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data...

    seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in whic...

    In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in which the server is multi-threaded. Then, you need to implement the server-side of the chat-room application in Java (implementing the client-side is optional). The server maintains a list (an ArrayList will work well) of all the active connections. It will listen on a port for a new...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT