StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Sciences - - Assignment Example

Cite this document
Summary
Course: Computer Sciences and Information Technology  Year: Subject: Student: Tutor: Question 1 A Transmission Control Protocol (TCP) is a protocol that facilitates the transportation of data across a network. In network communication, many layers are involved in the movement of packets from one host to another…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Computer Sciences - Assignment
Read Text Preview

Extract of sample "Computer Sciences -"

Computer Sciences and Information Technology  Year: Question A Transmission Control Protocol (TCP) is a protocolthat facilitates the transportation of data across a network. In network communication, many layers are involved in the movement of packets from one host to another. These layers all have different functions that help with the movement of packets. These layers are under the Open System Interconnection (OSI) model, and they are broken down into the following layers; physical, data link, network, transport, session, presentation and application.

These have been listed from the Network interface card to the computer interaction interface. These layers show how a data packet travels from one host to another, when it has been sent from a computer interface, for example, an email sent from a computer browser. It is encapsulated and changed into different forms until it reaches the network interface card in the physical layer, where it is sent as a signal, and the process of conversion takes place again. The result for the viewer is the email on the browser (Tanenbaum 86).

Many processes take place in the different layers to facilitate this communication. The Transmission Control protocol takes place in the transport layer of the OSI. This layer facilitates the transmission of packet using different communication protocols. This is done with accordance to the type of data and the communication/connection type. There are different types of protocols for handling this function. The TCP protocol uses a method called ‘handshake’ (Tanenbaum 92). In this method, the packet sends a request to the receiver, to query if it is able to receive the packet before it sends it.

When the packet has been sent to the receiver, the host has to give an acknowledgement that the packet has been received. When sending these packets, an IP address of the source is attached to the data segment and the destination host IP address. This is to confirm that the requesting host is the one that sent the data. It is also done for the reverse process. For this question, when the Host A has the source port number x and the destination port number y (Tanenbaum 213). When segments are travelling from Host B to Host A, the source port number is y, and the destination port number is x.

because the sender is now the receiver of the data segment. Question 2 In the transport layer of the OSI model, another method of Internet Protocol communication is the User Datagram Protocol (UDP). The factor that brings the difference between UDP and TCP is that UDP does not have the handshaking feature. This means that, in the UDP protocol, the packets do not need to query for permission before they start transmitting. When the packets have been sent, they do not need to send acknowledgements to the transmitter.

This can be viewed as problematic because some packets can be lost along the way and they will not be re-transmitted. For sensitive information, this can lead to data losses or corrupted packets received at the receiving host. The use of UDP always leads to dropped packets, duplicated packets, or incomplete packets at the receiver (Palmer 214). This protocol is useful for systems or applications that require real time data, or applications that would rather drop packets as a way for acknowledgement or re-sending of delayed packets.

This is used in time sensitive applications. This can provide reliable data transfer on an application that is running over a UDP network (Palmer 215). This is essential, as previously stated, for applications that do not require the resending of dropped packets. For example, when streaming a movie or a video, UDP would be more reliable as the data will be received in real time, without waiting for acknowledgement before sending. The dropped or lost packet for high volumes of data transfer like this will be almost negligible.

UDP also provides reliable data transfer over networks that require broadcast or multicasts of data (Palmer 216). Question 3 The TCP connections are designed towards reliability over time concerns. The protocol ensures that the data is delivered reliably over the network. This is with the acknowledgement mechanism where the data has to be acknowledged before it is sent. These other mechanisms that ensure reliability are the error checking mechanism which checks every packet that is received for errors in the data composition (Forouzan 111).

In the scenario where two TCP connections are present over some bottleneck, and both connections need to send a huge file, the connection will share the available transmission rate. This kind of bottleneck scenario usually results in reduced data transmission rates. The bandwidth allocated has to be shared among all the available connections. This will happen if the files are to be sent at the same time. The transmission rate R bps will be shared between the two connections so that each connection will send the file with R/2 bps (Forouzan 112).

References Forouzan, B 2003, TCP/IP Protocol Suite, McGraw Hill, New York. Palmer, M 2006, Hands-On Networking Fundametals, Cengage Learning, New York. Tanenbaum, A 2003, Computer Networks, Prentice Hall PTR, New York.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Sciences - Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Computer Sciences - Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1445478-week
(Computer Sciences - Assignment Example | Topics and Well Written Essays - 750 Words)
Computer Sciences - Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1445478-week.
“Computer Sciences - Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1445478-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences - Assignment

Assignment - Assistive Technology Plan

eading social science and liberal arts materials, particularly when doing research Because it is not only difficult for James to hold reading material for long periods of time, it is also cumbersome for him to read large amounts of material on the computer, microfilm, or via another medium.... This would eliminate his need to try to manipulate texts, the computer, or papers to suit his physical limitations....  computer Typing It is quite labor intensive for James to type....
4 Pages (1000 words) Assignment

Nursing Informatics in The Philosophy of the Nursing Course Program

Nursing Informatics is a specialty that integrates nursing science, computer science, and information science to manage data.... The writer of this assignment "Nursing Informatics in The Philosophy of the Nursing Course Program" intends to justify the need for a nursing informatics course in the nursing college programs....
8 Pages (2000 words) Assignment

Computer Science Assignment

The paper "computer Science Assignment" tells us about planning and analysis of Decker Repairs.... hellip; It explores in to identifying opportunities to improve the present situation and suggests a suitable computer Information system required to envelope all the deficiencies with the present system....
9 Pages (2250 words) Assignment

The Way of Interpreting Cultures and Responsibilities around Us

If people who are specialists in linguistics sciences are excluded, then most of the individuals in our society do not know about the Latin origins of English words.... The paper "The Way of Interpreting Cultures and Responsibilities around Us" tells that we don't know how our language originated....
8 Pages (2000 words) Assignment

How a Molecular Switch Works

One qubit can represent a zero, a one or any… Moreover, three qubits in any superposition of 8 and a couple of qubits can be in any quantum superposition of 4 conditions, and In general, a quantum computer with x qubits can be in a haphazard superposition of up to 2x different states Number] Physics (including Earth and space sciences: Assignment Concept of the Quantum Computer and the concept of the Qubit as opposed to the traditional bit As we know Quantum computer makes direct use of quantum-mechanical phenomena, entanglement and superposition, to process data....
2 Pages (500 words) Assignment

Portfolio- Revisions of two graded essays

If the IT department decides to implement the solutions found in my paper, then the standards of CCP computer lab shall be raised to give a stress free environment to students using computers at the lab and an equal chance for all the students to use the computers to complete their projects and class work.... Community college of Philadelphia has a high-tech computer lab that has all the necessary resources.... This is the reason the computer lab has a high student demand but with a low supply....
4 Pages (1000 words) Assignment

Introducation to computer science assingment

his makes it easy for the programmers to access the elements that are in the Introduction to computer science Q5.... The array of the pointers that are capable of being inter-linked to different structures helps the programmer to avoid having… The interlinking of the arrays in the structure enhances the reasoning on the quoted terms even in the settings that is untyped....
1 Pages (250 words) Assignment

Local Area Networking Technology

This paper looks into the Local Area Technologies with regard to a primary school setting.... In this regard, a specific networking technology is utilized to give a clear insight into the best way of having the primary school's networking devices connected in the most effective way possible.... hellip; As the report declares Local Area Networking technologies utilizes the concept of Local Area Network (LAN), which refers to the data communication network that connects computers, terminals, and printers in a building or within geographically limited areas....
15 Pages (3750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us