Systems Architecture
7th Edition
ISBN: 9781305080195
Author: Stephen D. Burd
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 9, Problem 10VE
Program Description Answer
If a Connectionless protocol is used, a receiver cannot detect loss of datagrams.
Hence, the correct answer is “Connectionless”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
O Differentiate between error detection and error correction. A bit
string
needs to be
0110111111100111110111111111100000
transmitted at the data link layer, what is string actually transmitted
after bit stuffing, if flag patterns is 01111110?
What is the rationale behind the requirement for a private network address? Is it possible for a datagram containing a private network address to be transmitted over the public Internet in its entirety? Explain?
2)
Will the following message-passing code cause communication deadlock if
2)
implemented in a synchronous message-passing system such as MPI blocking
send/receive? Explain why or why not.
P1
P2
P3
recv (&data3, P1)
send (&msgl, P3)
send (&msg2, P1)
...
...
recv (&datal, P2)
recv (&data2, P3)
send (&msg3, P2)
Knowledge Booster
Similar questions
- Physical Layer Provides access for *.the end user True O False O the network layer provides two related services: Addressing and *routing True O False O The number of users on a network has the greatest impact on the *network's reliability True O False O The physical layer is responsible for moving frames from one hop (node) *to the next True O False O The main disadvantage of NRZ encoding is that it requires two signal *changes to encode one bit True O False O Transmission media lie below the *transport layer True O False O Microwaves are used for cellular phone, satellite, and wireless LAN communications True O False O The minimum bandwidth of Manchester and differential *Manchester is twice that of NRZ True O False O The digital signal can have only two *Jevels True O False O Information must be encoded into signals before it can be transported *.across communication media True O False Oarrow_forwardFor APR protocol please: Describe the problem that APR helps to solve Why is the query message typically sent to the broadcast address?arrow_forward3. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted in binary for the four character frame: AB ESC FLAG when each of the following framing methods is used: 1.Character count 2.Flag bytes with byte stuffing 3.Starting and ending flag bytes, with bit stuffing.arrow_forward
- Why is it essential for you to have a network address that is only accessible to you? Is it feasible that in the distant future, a datagram with an address that belongs to a private network can, at some point in time, become accessible on the public Internet as a whole? Explain.arrow_forwardCan a connectionless datagram transfer service be provided across a connection-oriented network?arrow_forwardIs it feasible to create a single protocol that addresses every issue that arises during data communication? In that case, how?arrow_forward
- Is it possible to create a single protocol that handles all issues that arise during data communication?If so, how so?arrow_forwardThe Maximum size of a TCP Segment Header is _____ bytes a. 28 b. 24 c. 32 d. 20arrow_forwardThe following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted in binary for the four character frame: A B ESC FLAG when each of the following framing methods is used: a) Character count b) Flag bytes with byte stuffing c) Starting and ending flag bytes, with bit stuffing. Please solve within 30 minutes. Asap.arrow_forward
- 73. The maximum size of the data that the application layer can pass on to the TCP layer below is ......... a. 2^16 bytes b. 2^16 bytes + TCP header length c. Any size d. 2^16 bytes - TCP header lengtharrow_forwarddont dont post existing one strict warning skip if not known A new architecture, with N layers, is proposed. User application at the top layer generates a message of M bytes. At each layer, an H bytes header is added. The second layer of that architecture also adds T bytes trailer. In this architecture, the message M is not divided into smaller packets at any layer. • What is the size of the final message (in bytes) transferred by the lower layer? • If we consider the headers and trailers to be an overhead, what is the percentage of such overhead to the total size of the final message?arrow_forwardContention-based access protocols _____. a.are nondeterministic b.scale very well under heavy media use c.have more overheads than controlled-access protocols d.have mechanisms to track the turns to access the mediaarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning