This website uses cookies to ensure you have the best experience. Learn more

Data Networking Assignment

1568 words - 7 pages

Praveen Chekka

TSMG 5330 – Fall 2013

NU ID: 001942606

DATA NETWORKING ASSIGNMENT 03
1. The difference in browsing time or page load time depends of various factors. Different factors are Cookies, Caching, and HTTP persistent connection with pipelining, SPDY protocol and DHCP protocol. Cookies - HTTP server is stateless. Cookies help the server to identify them because it allows users as a function of identity to access the content. HTTP uses cookies to identify users and it is simply an identification card of internet user. Client request time is to be decreased by reducing number of bytes in request header and passing cookies along with HTTP request to fit the request into a ...view middle of the document...

SPDY adds a SSL session layer that allows concurrent HTTP requests over a single TCP session and reduces the bandwidth that is currently used by HTTP by compressing and eliminating headers. SPDY alters the way HTTP works by overriding the parts of the protocol. SPDY has few features that allow it to achieve lesser web latency. The features are Multiplexed streams, Request prioritization, and HTTP Header compression Multiplexed Streams – Concurrent streams over single TCP connection. Efficiency of TCP is higher. Request Prioritization – Client can assign a priority to each request which avoids congestion. HTTP Header Compression – Causes fewer packets to transmit. DNS Caching – When client requests for a web page DNS query is sent to local lookup server to get the IP address of requested webpage. This reduces the time taken for web page display.

Chekka.p@husky.neu.edu

Page 1 of 10

Praveen Chekka

TSMG 5330 – Fall 2013

NU ID: 001942606

2. TCP on Host side waits for three duplicate ACK’s before it does fast retransmit. It doesn’t perform fast retransmit after first ACK. This explained as below:

TCP can’t consider the very first ACK received as indication for the retransmission of the segment because TCP doesn’t know whether the ACK received is because of lost segment or re ordering of segments. If it considers the first ACK received as indication there might be a chance that the packet sent from sender to receiver might take more time to reach the receiver than the time taken for ACK to come from receiver to sender. The other case is if the first ACK is received only because of re ordering then only one or two duplicate ACKs will be received. The reason is so because that designers have chosen and designed the TCP the way, it should retransmit only if sender receives three or more duplicate ACKs in a row. Thus TCP performs a retransmission for the so called missing segment as three duplicate ACks are received before the timeout period. 3. Mirav has started designing best effort delivery service with variable delays and losses using Stop-nwait protocol with only ACK’s. As he doesn’t want to use sequence number the design can be explained as below: Mirav’s design will be incorrect without the use of sequence numbers. This can be justified cnsidering two scenarios, scenario (a) and scenario (b) Scenario (a) – If the acknowledgement of correctly received packet is delayed too much such that the timeout period has reached before the acknowledgement is received to send from receiver’s side. Then the sender retransmits the packet ‘r’ as the acknowledgement is too delayed and it didn’t reach the sender. This causes the receiver getting duplicate packets which receiver would n’t be able to identify as there are no sequence numbers. Scenario (b) – If the acknowledgement of correctly received packet is lost during the transmission then the sender waits for the timeout period to resend the same packet. As the retransmission of same packet...

Other Essays Like Data Networking Assignment

Distributed Database Essay

961 words - 4 pages Assignment 8: Distributed Databases The reason for writing this paper is to clarify the importance of distributed database and why national chain restaurant should implement it. Given the situation presented in the assignment a small restaurant has grown to become a national restaurant chain and now they are concerning more on the distribution of data among different sites chains. For this approach distributed database architecture is

Cyptography Essay

1018 words - 5 pages solution providing network firewall, intrusion prevention and gateway antivirus, all under one name. * DSL: Digital subscribers link provides transmission of digital data over telephone lines. * Backhaul: It is a link between main internet and the organization’s sub net. * Virtual Router redundancy Protocol: It is a protocol that provides automatic assignment of available internet protocols (IPs) routers to participating hosts

Job Specification Ttc Principal

647 words - 3 pages JOB SPECIFICATION Principal TTC Hunar Foundation Multan Source – page 6 Careers – DAWN Newspaper 01 May 2016 Assignment 3 Instructor Ms. Zil e Huma HRM Course Summer 2016 Form HRIF 02A Job Specification – TTC School Principal Reporting to Secretary School Board of Management Hunar Foundation Responsible for 6 staff of Supervisor grade Special requirements: Not to be overweight or suffer from any handicaps / diseases

Assignment 1

1174 words - 5 pages 1/30/2015 ITS 331 – Networking and Essentials Assignment #1 Questions 1) State whether the following network descriptions are describing a MAN, WAN or LAN: a. A network of users that share computer resources in a limited area - LAN b. A network of users that share computer resources across a metropolitan area - MAN c. A network that connects local area networks across a large geographic area - WAN 6) Define the term protocol It is set

Computersecurity

922 words - 4 pages check the work prior to it being sent. Anything containing typos or misspellings shows that the fourth principle was not used by our IT specialist. Normally, as an assistant in the IT department from time to time, I will email things to myself (personal email) to ensure it has not been compromised. I think this step enhances the security and integrity as well as the accuracy of the data being sent. Researching for this assignment I found that the

Mkt 571 Week 1 Quiz Latest Uop Assignment

982 words - 4 pages MKT 571 Week 1 Quiz Latest UOP Assignment 1. What data analysis type is being used here? When Sam thought about opening a foreign car repair shop in Phoenix, he researched all of the firms in the area before deciding on a location. He also analyzed their capabilities and found articles about many of them in terms of their capabilities, strengths, and weaknesses. • Secondary data • Primary data • Licensed information

Mkt 571 Week 1 Quiz Uop Homework Help

996 words - 4 pages MKT 571 Week 1 Quiz 1. What data analysis type is being used here? When Sam thought about opening a foreign car repair shop in Phoenix, he researched all of the firms in the area before deciding on a location. He also analyzed their capabilities and found articles about many of them in terms of their capabilities, strengths, and weaknesses. • Secondary data • Primary data • Licensed information • Tertiary information 2

Et1210 W7 Homework

696 words - 3 pages Nicole Lumford Mr. Alsaad Introduction to Networking 29 March 2014 Unit 2 Assignment 2: Computer Basics Review Multiple-choice questions 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals. D. The call represents short sounds as a unique set of bits. 4. C. The call uses both analog and digital electrical signals D. The call represents short sounds as a unique set of bits

Wlan Project Proposal

1694 words - 7 pages Page no 1. Executive Summary……………………………………………..4 2. Scope of the assignment………………………………………..5 3. Objective of the assignment…………………………………….6 4. Proposed WLAN solution……………………………………….6,7 5. Implementation schedule ………………………………………..9 6. List of proposed equipments required for the assignment…..10 7. Cost matrix and schedule

It204 Ip#5

1184 words - 5 pages Name: Matt Peck Date: 11/5/2015 IT204-1504A-08 Fundamentals of Networking Professor: James Iannibelli  Assignment: Individual Project Unit #5 A protocol is a rule that identifies some aspect of how computers communicate on a network. In order for two computers to communicate, they need to be using the same protocols. Protocols are grouped into protocol suites, or sets of related protocols that are meant to be used together. Common

Structure Of Management Information

1886 words - 8 pages , Computer Networking ¡V A Top Down Approach Featuring the Internet, (2nd Edition), Addision-Wesley, ISBN: 0 321 17644-8 (the International Edition), ISBN 0-201-97699-4. Michael J. Palmer & Robert Bruce Sinclair, Advanced Networking Concepts, Course Technology, ISBN 0-7895-0195-3 Houston H. Carr & Charles A. Snyder, The Management of Telecommunications- Business Solutions to Business Problems, The McGraw-Hill Companies, ISBN 0-256-21961-3 William Stallings & Richard Van Slyke, Business Data Communications, (Third Edition), Prentice Hall, ISBN 0-13-594581-X

Related Papers

Formal Report Social Networking

5068 words - 21 pages [pic] FORMAL REPORT SOCIAL NETWORKING Prepared for Elke M. Leeds Professor, BISM 2100 Kennesaw State University Prepared by Starr Bruner Matthew Hepler Nicole Myers Andy Young Kennesaw State University April

Data Mining Research Essay

598 words - 3 pages mining is a process that allows data collection via cluster analysis, automatic interaction detection, predictive modeling, neural networking and even regression (Kotler, & Keller, 2012). It is also a process that can predict future prospects, the best marketing mediums, loyal customers, frequent customer purchases, and serious or potential risks within the business (Hormazi, & Giles, 2012). The article also focuses on Hampton Creek’s use of

Unit 3 Assignment 1

606 words - 3 pages Unit 3 Assignment 1: Networking Models Review 1. Which of the following is true about a TCP/IP network? 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) A.D. 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B.C. 4. Contrast an

Thesis About The Study Habits Essay

2559 words - 11 pages , students don't know where to begin, don't fully understand the material, are not motivated by it, or feel that there was too much work given to them with too little time t... Chapter II Review of Related Literature and Studies Investigations in any area spring from previous knowledge. No matter how minimal or extensive they are, they serve in part as baseline data. This Chapter presents the literature/references gathered by the researcher