1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
4 years ago
15

Consider a simple application level protocol built on top of udp that allows a client to retrieve a file from a remote server re

siding at a well known address. the client first sends a request with file name, and the server responds with a sequence of data packets containing different parts of the requested file. to ensure reliability and sequenced delivery, client and server use a stop - and - wait protocol. ignoring the obvious performance issue, do you see a problem with this protocol? think carefully about the possibility of processes crashing.
Computers and Technology
2 answers:
Vsevolod [243]4 years ago
6 0
This Wikipedia article has some useful information. It's good for a reference source. Hope it helps! https://en.wikipedia.org/wiki/Stop-and-wait_ARQ
Molodets [167]4 years ago
4 0

Answer:

Explanation:

Let consider a simple application-level protocol is build on the top of the UDP that allows a client to retrieve a file from a remote server exist in a well-known address. Here, UDP is User Datagram Protocol.

• The client first sends with a file name and the server responds with a sequence of data packets that contain the requested file.

•To ensure reliability and sequenced delivery,here the client and server are using the stop-and-wait protocol.

Problems occur with this protocol:-

The given statement makes the possibility for a client system to get the wrong file.

Let us assume that there are two clients A and B available, and the client A sends a request for a file

"F1" and then it gets crashed.

The client B sends same protocol to request some other file "F2";

In this case, the client B is running on the same machine of where the client A is running and then both files F1 and F2 are using the same IP addresses.

The client B binds its User Datagram Protocol socket to the same port of the client A was using previously.

In case the client B's request is lost when the server's reply for the client A arrive.

And also, client B receives it and assumes that it is a reply for its own request.

Hence, the client system gets the wrong file, when using this approach.

You might be interested in
What is a distinguishing feature of 5G mmWave
Tatiana [17]

Answer:

Explanation:

mmWave sử dụng phổ vô tuyến tần số cao (từ 24 GHz đến khoảng 39 GHz) để hoạt động, cho phép tăng tốc độ (và thậm chí xa hơn, trong một số trường hợp) 1Gbps. Vấn đề là việc tăng tần số lên càng cao thì khả năng đâm xuyên càng kém đi và khoảng cách truyền ngắn lại, theo Qualcomm thì đôi khi chỉ cần một bàn tay chắn trước điện thoại là đủ để máy khôngBên cạnh đó, mmWave cũng có khả năng làm hao pin thiết bị hơn, ít nhất là ở thời điểm hiện tại. Theo đó, việc tải xuống nhiều dữ liệu hơn có nghĩa là CPU điện thoại của bạn sẽ hoạt động mạnh hơn, nhanh nhất có thể để xử lý tất cả và điều đó sẽ ảnh hưởng đến tuổi thọ pin nhận tín hiệu.

5 0
3 years ago
Which of the following statements best represents the impact vaudeville had on the film industry? Early silent films were more r
maria [59]

Answer:

Answer is B: Early silent film producers used many of the same acting techniques popularized in vaudeville performances, even using popular vaudeville stars as actors in their productions.

Explanation:

7 0
3 years ago
A database program helps to ____________.
Juliette [100K]
D. A database is software which is designed to store massive amounts of data and organize them in such a way that information can easily be worked on (added, deleted, moved, etc...).
8 0
3 years ago
Read 2 more answers
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
klemol [59]

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

3 0
3 years ago
TVBCA has just occupied an old historic building in downtown Pittsburgh in which 15 employees will work.
7nadin3 [17]

Answer:

A. The proposed solution delivers the required result and both optional desired results.

Explanation:

The IEEE 802.11a is the standard code of the wireless communication technology known as WIFI, it is wireless as it requires no cable to connect to a network device. The data transmission rate of the IEEE 802.11a is 1.5 - 54Mbps (mega bit per second). So, the employees in the TVBCA building can wireless connect to the network, which allows them to be mobile and they can also send large CAD files among themselves.

6 0
3 years ago
Other questions:
  • The main thing that adjusting the aperture controls when taking an image is?
    15·1 answer
  • List at least 4 types of works covered by copyright law
    5·1 answer
  • You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web applica
    7·1 answer
  • What is the target audience of an ad?
    11·1 answer
  • When you touch a hot stove, along which pathway will the impulses travel and what is the final destination in the cns?
    12·1 answer
  • Adding Web pages helps Web designers ___. Choose all answers that are correct.
    13·1 answer
  • What help in executing commands quickly
    5·1 answer
  • Who elso does their online school in their bed cause i do
    7·2 answers
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
  • The int function can convert floating-point values to integers, and it performs rounding up/down as needed.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!