Explain different strategies-transfer file between computers

Assignment Help Computer Networking
Reference no: EM1371844

When transferring a file between two computers, (at least) two acknowledgment strategies are possible. In the first one, the file is chopped up into packets , which are individually acknowledged by the receiver, but the file transfer as a whole is not acknowledged. In the second strategy, the packets are not acknowledged individually, but the entire file is acknowledged when it arrives. Discuss the two approaches.

Reference no: EM1371844

Questions Cloud

What routing protocol is suitable for retail customer : What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.
Practice of tipping : In most restaurants, waiters receive a big portion of their compensation through tips from customers. Generally, the size of the tip is decided by the customer. However, many restaurants require a 15 percent tip for parties of eight or more.
Determining total cost problem-cost per unit : Company A plans to produce 300,000 units next year, the production budget is: Compute the total cost and cost per unit when the unit production is changed to 315,000 units.
Financial impact of outsourcing the grounds maintenance : College A is planning outsourcing their groundskeeping. They have been given a bid from Groundskeeper Willie for $250,000 a year, with the claim that he will keep school grounds in the same condition they are in now.
Explain different strategies-transfer file between computers : In second strategy, packets are not acknowledged individually, but whole file is acknowledged when it arrives. Explain the two approaches.
Decrease in price of access : The steady increase in demand for home computers has resulted in the massive increase in demand for web access, yet, the price of access has been steadily declining.
Attributes of new economy : Supposing a products is produced both in the US and abroad what would be the effects of the US import quota on the good? Discuss some of the attributes of the new economy.
Computing payback period, present worth and irr : As the manager of exploration for Chieftain Oil & Gas, you are  assessing    a new offshore oil recovery method that will recover oil and gas deep in the Gulf of Mexico.
Calculating higher data rate in atm line : Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

Reviews

Write a Review

Computer Networking Questions & Answers

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Derive general expression for width of bit propagation speed

Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.

  Determine the ip addresses of google and yahoo

Determine the IP addresses of www.google.com and www.yahoo.com. Modify hosts file to map www.google.com to yahoo's IP address and try to do google search. Remove modification to host file and repeat.

  Explain analogy to sending a physical package

Identify each of the blocks commonly employed and utilize an analogy to sending a physical package to explain what each block does.

  Dac system explain how mac system could be implemented

Given a DAC system explain how a MAC system could be "implemented" on top of this DAC system. Explain any problems and assumptions.

  Congestion control in error-free virtual circuit subnet

Consider the following method for congestion control in a error-free virtual circuit subnet.

  Illustrate are lans a stable technology

Are LANs a stable technology or are they changing just as quickly as other forms of communication technologies? Should software licenses be dropped completely?

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  Adding four servers to network to share file

Manager would like to add four servers to network so employees can share files. Manager would also like to permit VPN access for her employees so they can work remotely.

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

  Tools and processes for scanning vulnerabilities

Write down the tools and processes for scanning and removing possible vulnerabilities?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd