1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
2 years ago
14

Q1) Suppose you have following two bytes data (although UDP uses a 16-bit word but we use 8-bit here for the sake of simplicity)

Byte1: 00110100 Byte2: 01101001 a) Compute the checksum (this checksum is sent by the sender in UDP header) b) In flight (over the network), least significant bit is corrupted to 1 for Byte1, and least significant bit is corrupted to 0 for Byte2. With this data, what checksum will be computed at the receiver side c) If UDP receiver computes the Internet checksum for the received UDP segment and finds that it matches the value carried in the checksum field, can the receiver be absolutely certain that no bit error have occurred? Explain. Question 2: a) In Stop and wait protocol, sender wait for ACK before sending next packet. But what if an ACK is dropped in the network and never reached to sender. What sender should do in that case? b) A sender process transmits 100 packets towards destination process. Out of 100, 80 packets successfully reach the destination whereas 20 packets drop in the network. How many ACKs will be sent by the receiver towards sender while using: • ACK (positive/ normal ACK) • NACK c) Why do we need length field in UDP header when we know that the length of the UDP header is always fixed (i.e. 8 Bytes)?
Computers and Technology
1 answer:
Nimfa-mama [501]2 years ago
8 0

Q1. Checksum: 10000002 11100110

b. Checksum: 10000001 11100111

Q1 a) To checksum two bytes of data, the two bytes can be concatenated and treated as a 16-bit word. The checksum can be calculated by adding two bytes using one's complement representation. The checksum is the one's complement of the sum. for example:

Byte 1:

00110100

Byte 2:

01101001

Linking:

00110100 01101001

total:

01111101 00011001

One's complement:

10000002 11100110

Checksum: 10000002 11100110

b) If the least significant bit of byte1 is corrupted to 1 and the least significant bit of byte2 is corrupted to 0, the resulting data will be:

Byte 1:

00110101

Byte 2:

01101000

Linking:

00110101 01101000

total:

01111110 00011000

One's complement:

10000001 11100111

Checksum: 10000001 11100111

c) No, if the Internet checksum matches the value contained in the checksum field, the recipient cannot be completely certain that no bit errors have occurred. Internet checksums are used to detect errors in data during transmission, but are not a foolproof method. There may still be errors in the data that the internet checksum failed to detect.

Q2)

a) If her ACK was dropped on the network and never reached the sender with a stop-and-wait protocol, the sender should time out and resend the packet.

b) If the sender sends his 100 packets, 80 packets successfully reach the destination, and 20 packets are dropped in the network, the receiver receives Send his 80 his ACKs (acknowledgments). The receiver does not send her NACK (negative ACK) because all packets were received successfully.

c) The UDP header length field is required to specify the length of the UDP datagram, including the UDP header and payload. The UDP header length is fixed at 8 bytes, but the payload length can vary. The length field is necessary so that the receiver can determine the end of her UDP datagram and process the payload correctly.

Read more about this on brainly.com/question/15209657

#SPJ4

You might be interested in
I try to make an account so I can have some help, but it always says "We’re sorry, but we are not able to complete your registra
Romashka-Z-Leto [24]

Answer:

that keeps happening to me too i sent them a email and they said they are trying to fix it

8 0
3 years ago
Why might it be important to be careful when placing multiple microphones around the same sound source
Softa [21]

Answer:

I think you can get mic feedback from all of the microphones

Explanation:

Let me know if this is the answer you are looking for

8 0
3 years ago
A presenter selects multimedia materials primarily based on their ability to
Kisachek [45]
A presenter selects multimedia materials primarily based on their ability to emphasize a point.
7 0
3 years ago
Read 2 more answers
When creating a document template, you can either start from an existing document or begin from _____.
Anna35 [415]
A new blank document
7 0
3 years ago
Five features of any window​
Vesna [10]

Answer:

The features of any windows are

1. Start menu

2. Notification area or task bar

3. Window snipping tools

4. Using Local Area Networks

5. Windows explorer libraries

Explanation:

8 0
3 years ago
Other questions:
  • Someone please help me with the right answer please
    13·1 answer
  • Quien invento el primer vehiculo con motor?
    15·2 answers
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • Instructions:Select the correct answer.
    8·2 answers
  • The proxy statement issued by a corporation is a requirement of: a. The Securities & Exchange Commission (SEC) b. The Financ
    5·1 answer
  • What happens when a user clicks the question mark at the top of the Backstage view?
    14·2 answers
  • Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is neede
    14·1 answer
  • Major characteristics of the bus in computer architecture​
    8·1 answer
  • Declare a struct of your choice (Employee, Student etc). Delcare a node for singly link list. Declare an ADT of this linklist. T
    7·1 answer
  • Using what you have learned, describe the effect of
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!