Question

When a message is sent over the Internet. Before the message is sent, it is broken...

When a message is sent over the Internet. Before the message is sent, it is broken into data packets. These packets are numbered consecutively, but they are out of order during transfer over the network. In order for the messagesd to be read it needs to be sequenced. In 300 words discuss how you would sort these packets with bubble sort and merge sort algorithms, explaining why you chose these two kinds of algorithm. Use numbers to demonstrate how these algorithms work. Hint: Create a series of numbers to represent the data packets

0 0
Add a comment Improve this question Transcribed image text
Answer #1

It would be better if we also include the ending and starting acknowledgement of packet sending from the source. The reason for doing so is we can count the number of packets which the source sends and the number of packets receiver received.

Once done, the bobble or merge sort algorithm will be called by passing the array of elements and will be sorted based on the packet numbers, packet with number 1 will be sorted at the position number 0 and the last packet will be placed on the last position.

It is also necessary to pay attention at the running time of these two algorithms in each scenario because while sending large files which include thousands of packets, the optimized performance is very crucial to sort the packets.

We know that merge sort is much better than bubble sort so it is quite obvious that the choice for sorting will be merge sort.

Now after sorting the packets and receiving the information from the packets we will came to know what information is passed from the sender and what information we receives.

Following example will explain better what exactly will happen.

Suppose we send 150 packets at random and similarly the receiver receives 150 packets at random. Now after getting the final received acknowledgement from the sender, the merge sort will be called and before that all the packets received will be added to a list.

The list which is passed to the merge sort will now starts rearranging the packets in ascending order, here it is necessary to specify the order of sorting because by doing so the sorting algorithm will work, now suppose a situation where the packets are arranged in reverse order, this will destroy the original information.

Add a comment
Know the answer?
Add Answer to:
When a message is sent over the Internet. Before the message is sent, it is broken...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • When you write an email to your family, the email is sent over the Internet. Before...

    When you write an email to your family, the email is sent over the Internet. Before the message is sent, it is broken into many data packets. These data packets are numbered consecutively, but they are out of order while transferred over the network. The packets need to be sequenced when they reach the destination computer so your family can read your message. Discuss how you would sort these packets with two kinds of sort algorithms.

  • I need the report like this (idea) *Sorting Algorithms: A sorting algorithm is an algorithm that...

    I need the report like this (idea) *Sorting Algorithms: A sorting algorithm is an algorithm that puts elements of a list in a certain order. The most-used orders are numerical order and lexicographical order. Efficient sorting is important for optimizing the use of other algorithms (such as search and merge algorithms) which require input data to be in sorted lists; it is also often useful for canonical zing data and for producing human-readable output. More formally, the output must satisfy...

  • PLEASE DO BOTH #5 AND #6. The purpose of the project is to perform a timing...

    PLEASE DO BOTH #5 AND #6. The purpose of the project is to perform a timing experiment. You are required to complete the following activities: Write a computer program that prompts the user for a number, creates an array for that number of random integers, and then usees the bubble sort to order the array. The program should print out the array prior to the call to the sorting algorithm and afterwards. You can write the program in either Java,...

  • PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the...

    PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the Go-Back-N and Selective repeat protocols, what does the window value signify? The packets that have already been ACKed The packets sent but remain unACKed The sequence numbers available and not yet sent The sequence numbers of packets not yet available None of the above 1 points    QUESTION 2 Which of the following is NOT a component of the TCP congestion control algorithm? Slow...

  • help with computer network questions 1. What is the difference between circuit switching and packet switching?...

    help with computer network questions 1. What is the difference between circuit switching and packet switching? 2. What are the different layers in today’s Internet? Why do we create layers? 3. Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on Earth. Every minute the satellite takes a digital photo and sends it to the base station. Assume a propagation speed of 2.4 * 10^8 meters/sec. a. What is the propagation delay of...

  • Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper)...

    Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper) utility, which can be used on a network running IPv4 to verify that TCP/IP is configured correctly and communicating with the network. A ping test is typically the first thing network professionals try when troubleshooting a TCP/IP connection problem. For this project, you can use any type of workstation that's running TCP/IPv4, preferably one connected to the Internet. The output described in the following...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b....

    pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b. an operating system c. a computer language d. an algorithm 2) separated the programming task from the computer operation tasks. a. Algorithms b. Data processors c. High-level programming languages d. Operating systems 3) is a 16-bit code that can represent symbols in languages other than English. a. ASCII b. Extended ASCII c. EBCDIC d. Unicode 4) When you want to download music to a...

  • Lab Objectives Be able to write methods Be able to call methods Be able to declare...

    Lab Objectives Be able to write methods Be able to call methods Be able to declare arrays Be able to fill an array using a loop Be able to access and process data in an array Introduction Methods are commonly used to break a problem down into small manageable pieces. A large task can be broken down into smaller tasks (methods) that contain the details of how to complete that small task. The larger problem is then solved by implementing...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT