Systems Architecture
7th Edition
ISBN: 9781305080195
Author: Stephen D. Burd
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 9, Problem 10VE
Program Description Answer
If a Connectionless protocol is used, a receiver cannot detect loss of datagrams.
Hence, the correct answer is “Connectionless”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
O Differentiate between error detection and error correction. A bit
string
needs to be
0110111111100111110111111111100000
transmitted at the data link layer, what is string actually transmitted
after bit stuffing, if flag patterns is 01111110?
What is the rationale behind the requirement for a private network address? Is it possible for a datagram containing a private network address to be transmitted over the public Internet in its entirety? Explain?
Physical Layer Provides access for
*.the end user
True O
False O
the network layer provides two
related services: Addressing and
*routing
True O
False O
The number of users on a network
has the greatest impact on the
*network's reliability
True O
False O
The physical layer is responsible for
moving frames from one hop (node)
*to the next
True O
False O
The main disadvantage of NRZ
encoding is that it requires two signal
*changes to encode one bit
True O
False O
Transmission media lie below the
*transport layer
True O
False O
Microwaves are used for cellular
phone, satellite, and wireless LAN
communications
True O
False O
The minimum bandwidth of
Manchester and differential
*Manchester is twice that of NRZ
True O
False O
The digital signal can have only two
*Jevels
True O
False O
Information must be encoded into
signals before it can be transported
*.across communication media
True O
False O
Knowledge Booster
Similar questions
- 2) Will the following message-passing code cause communication deadlock if 2) implemented in a synchronous message-passing system such as MPI blocking send/receive? Explain why or why not. P1 P2 P3 recv (&data3, P1) send (&msgl, P3) send (&msg2, P1) ... ... recv (&datal, P2) recv (&data2, P3) send (&msg3, P2)arrow_forwardFor APR protocol please: Describe the problem that APR helps to solve Why is the query message typically sent to the broadcast address?arrow_forwardWhy is it essential for you to have a network address that is only accessible to you? Is it feasible that in the distant future, a datagram with an address that belongs to a private network can, at some point in time, become accessible on the public Internet as a whole? Explain.arrow_forward
- Is it feasible to create a single protocol that addresses every issue that arises during data communication? In that case, how?arrow_forwardCan a connectionless datagram transfer service be provided across a connection-oriented network?arrow_forward3. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted in binary for the four character frame: AB ESC FLAG when each of the following framing methods is used: 1.Character count 2.Flag bytes with byte stuffing 3.Starting and ending flag bytes, with bit stuffing.arrow_forward
- Is it possible to create a single protocol that handles all issues that arise during data communication?If so, how so?arrow_forwardThe Maximum size of a TCP Segment Header is _____ bytes a. 28 b. 24 c. 32 d. 20arrow_forwardThe following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted in binary for the four character frame: A B ESC FLAG when each of the following framing methods is used: a) Character count b) Flag bytes with byte stuffing c) Starting and ending flag bytes, with bit stuffing. Please solve within 30 minutes. Asap.arrow_forward
- 73. The maximum size of the data that the application layer can pass on to the TCP layer below is ......... a. 2^16 bytes b. 2^16 bytes + TCP header length c. Any size d. 2^16 bytes - TCP header lengtharrow_forwarddont dont post existing one strict warning skip if not known A new architecture, with N layers, is proposed. User application at the top layer generates a message of M bytes. At each layer, an H bytes header is added. The second layer of that architecture also adds T bytes trailer. In this architecture, the message M is not divided into smaller packets at any layer. • What is the size of the final message (in bytes) transferred by the lower layer? • If we consider the headers and trailers to be an overhead, what is the percentage of such overhead to the total size of the final message?arrow_forwardContention-based access protocols _____. a.are nondeterministic b.scale very well under heavy media use c.have more overheads than controlled-access protocols d.have mechanisms to track the turns to access the mediaarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning