1) Consider a reliable data transfer protocol that uses only negative acknowledgments. Suppose the sender sends data only infrequently. Would a NAK-only protocol be preferable to a protocol that uses ACKs? Why? 2) Besides network-related considerations such as delay, loss, and bandwidth performance, there are other important factors that go into designing a CDN server selection strategy. What are they? 3) What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of these layers? List five tasks that a layer can perform. 4) Why do HTTP, SMTP, and POP3 run on top of TCP rather than on UDP? 5) List six access technologies. Classify each one as home access, enterprise access, or wide-area wireless access, and then describe how they fundamentally operate.
1) Consider a reliable data transfer protocol that uses only negative acknowledgments. Suppose the sender sends data only infrequently. Would a NAK-only protocol be preferable to a protocol that uses ACKs? Why?
2) Besides network-related considerations such as delay, loss, and bandwidth performance, there are other important factors that go into designing a CDN server selection strategy. What are they?
3) What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of these layers? List five tasks that a layer can perform.
4) Why do HTTP, SMTP, and POP3 run on top of TCP rather than on UDP?
5) List six access technologies. Classify each one as home access, enterprise access, or wide-area wireless access, and then describe how they fundamentally operate.
Trending now
This is a popular solution!
Step by step
Solved in 4 steps