Question

When you write an email to your family, the email is sent over the Internet. Before...

When you write an email to your family, the email is sent over the Internet. Before the message is sent, it is broken into many data packets. These data packets are numbered consecutively, but they are out of order while transferred over the network. The packets need to be sequenced when they reach the destination computer so your family can read your message. Discuss how you would sort these packets with two kinds of sort algorithms.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. Stop-n-Wait protocol :

This aims at sending an acknowledgement for each packets received and the order has to be maintained. If any packet is not received, no acknowledgement is sent to the sender. Hence the sender understands that the packet was not sent and hence re--transmits the packet. If any packet out of sequence reaches the receiver and the previous packets has not arrives, it send a NACK for negative acknowledgement hence telling the sender to send again.

2. Go back n protocol:

When ever any sequence reaches out of order or any previous packet is faulty, the receiver sends a NACK to the sender and sender sends all the packets sent there after from the negatively acknowledged packet.

Add a comment
Know the answer?
Add Answer to:
When you write an email to your family, the email is sent over the Internet. Before...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • When a message is sent over the Internet. Before the message is sent, it is broken...

    When a message is sent over the Internet. Before the message is sent, it is broken into data packets. These packets are numbered consecutively, but they are out of order during transfer over the network. In order for the messagesd to be read it needs to be sequenced. In 300 words discuss how you would sort these packets with bubble sort and merge sort algorithms, explaining why you chose these two kinds of algorithm. Use numbers to demonstrate how these...

  • What happens when the packets sent from a computer (at the application layer) reach various network...

    What happens when the packets sent from a computer (at the application layer) reach various network nodes – local computers, remote computers, local attached routers/switches, remote routers/switches, hubs, etc.? Please discuss what network nodes of different types know about the application file being transmitted (based on what information is provided in the header at the OSI layer at which that node operates) at each level of reassembly (i.e., viewing the frame packet only, reassembling frame packets to recreate the IP...

  • You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose...

    You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose and Ross for the following labs. Please read the instructions below for submissions. Upload the shared pcap file (Homework5.pacp) into wireshark. HTTP In this lab, we’ll explore several aspects of the HTTP protocol. Capture packets and filter for http protocol and answer the following questions. (Hint: Apply http filer) What version of HTTP version(1.0 or 1.1) is client running and what is the version...

  • Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper)...

    Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper) utility, which can be used on a network running IPv4 to verify that TCP/IP is configured correctly and communicating with the network. A ping test is typically the first thing network professionals try when troubleshooting a TCP/IP connection problem. For this project, you can use any type of workstation that's running TCP/IPv4, preferably one connected to the Internet. The output described in the following...

  • The goal of this first lab was primarily to introduce you to Wireshark. The following questions...

    The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation: 1. List up to 10 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 Step 7: After your browser has displayed the INTRO-wireshark-file1.html page, stop Wireshark packet capture by...

  • A company that wants to send data over the Internet has asked you to write a...

    A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your application should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first...

  • Using python 3 to create the UDP Ping Clien and server. Using UDP sockets, you will...

    Using python 3 to create the UDP Ping Clien and server. Using UDP sockets, you will write a client and server program that enables the client to determine the round-trip time (RTT) to the server. To determine the RTT delay, the client records the time on sending a ping request to the server, and then records the time on receiving a ping response from the server. The difference in the two times is the RTT. The ping message contains 2...

  • Your line manager, Ahmed, has sent you the following email late on Wednesday just as you...

    Your line manager, Ahmed, has sent you the following email late on Wednesday just as you are about to finalise your timesheet and head to a monthly tax-update webinar: From: Ahmed Sent: Wednesday, 16 September 2020, 3:58PM Subject: URGENT: Lisa Eastwood meeting scheduled, task assigned Good afternoon, I have just spoken with Lisa Eastwood (new client) over her tax position for the current tax year. I will be getting further documentation tomorrow; however, I need you to examine my notes...

  • I had tried to work with the wireshark interface and cannot navigate it due to network problems a...

    I had tried to work with the wireshark interface and cannot navigate it due to network problems and cannot find the question solutions, if any one can help with detailed steps it would be a great help. Wireshark Lab #2: Ethernet In this lab, we'll investigate the Ethernet protocol and the ARP protocol. Before beginning this lab, you'l1 probably want to review sections 6.4.1 (Link-layer addressing and ARP) and 6.4.2 (Ethernet) in the text. RFC 826 (ftp://ftp.rfc-editor.org/in- notes/std/std37.txt) contains the...

  • It is Monday morning, and as you set your coffee on your desk and open your...

    It is Monday morning, and as you set your coffee on your desk and open your email, the first message catches your eye. The subject line is “Your invoice is unacceptable!” “Uh-oh,” you think to yourself, “this is not a good start to the week!” You are the business manager for Catapult Construction Company. The owner, Thrace, is a talented builder who takes great pride in his work, but has trouble communicating with clients. On a recent job, he had...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT