A network with occasional errors will be used for the following applications. Identify the best network protocol (TCP or UDP) to use. Explain the reasons for your choice.
Downloading a movie for later viewing
Streaming music
Online gaming
Downloading a movie for later viewing : TCP
When we are downloading a movie for later viewing there should not be any loss of intermediate frames. In online movie streaming the user can allow loss of frames since the human eye can not detect all the intermediate frame transition. But in saving a video any frame loss can cause unavailability of the related frames and rendering problems. So, TCP is the best option as no data loss is allowed.
Streaming music : UDP
Any kind of online streaming of movie or music uses UDP as every single frame is not important and loss of data is allowed.
Online gaming : UDP
Online gaming uses UDP since in online gaming not every update is mandatory. Also in online gaming the user wants minimum or no lags in response. So, online gaming uses UDP.
Email : TCP
E-mail uses TCP since it assures security and no data loss.
Hope this helps.
A network with occasional errors will be used for the following applications. Identify the best network...
Use WireShark to monitor the initiation, communication, and termination of a session involving any TWO of the following applications: a) VoIP b) A file transfer using the file transfer protocol of your choice c) A browser session using the browser and protocol of your choice d) A remote login using the application of your choice e) A video gaming session involving a video game that has a TCP or UDP port assignment You should make screenshots of the interesting parts...
Identify a network topology that would best suit each of the following environments and explain why: a. Dormitory floor b. University campus c. Airport d. State or province Additionally, for each environment identify a poor network topology choice and justify your response.
1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...
21. App (application software) requires a member of transport services to function. Which choice best describes the transport service required by an app? a. Reliable data transfer and long delay in transmission b. Good throughput and data integrity c. Data secunty and long delay in transmission d. long delay in transmission and poor timing 22. This transport protocol does not provide flow control reliability, congestion control, time or security. Which transport protocol is it? a. File transfer protocol b. Transmission...
PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the Go-Back-N and Selective repeat protocols, what does the window value signify? The packets that have already been ACKed The packets sent but remain unACKed The sequence numbers available and not yet sent The sequence numbers of packets not yet available None of the above 1 points QUESTION 2 Which of the following is NOT a component of the TCP congestion control algorithm? Slow...
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...
1ai. Why layered network architectures. Give a concise description of how layer networks are implemented. ii. Describe the function and services offered by TCP/IP protocols. iii. The following terms have been used to describe the hypertext transfer protocol(HTTP) protocol: client-server, stateless, non-persistent and persistent connection. Describe each term. iv. Identify session layer and presentation layer function in the HTTP protocol. b. Suppose a computer is moved from one department to another. Answer yes or no to the following questions and...
Date Q.1- Deternine if the following statements are f ue ow Fae I- Different URLs can be mappel to the same IP wlivess 2- HTML refers the application layer rotoeol that is used to tranafer wehpages to m server to the client 3- The web browser can serve as an HTTP elient or an TTP serve 4- When the congestion point is reached, the eongestion control algorithn wehuces the congestion window into half of its previous value s- The domain...
Identify a network topology that would best suit each of the following networked environments and explain why. 1.Apartment building 2.Collection of Apartment Buildings 3.City Convention Center
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...