Flow Control Vs. Congestion Control In Computer Networks: Questions And Analysis

Improved Essays
Agree, even if the router has infinite amount of memory congestion does not get controlled on the contrary it gets worse. Memory increase causes the rate of the arriving packets to be more but the outgoing packets rate decreases. Once the packets get to the front of the queue they have already time out over and over again; in addition, duplicates of these packets are forward to the next router, causing an increase of load all the way to the final destination.
2. Compare the following:
• Flow Control vs. Congestion Control o Flow Control is used in Computer Networks because of its mechanism of controlling the data flow between sender and receiver. As a result if there is a slow receiver this is not overwhelmed with all the data transmitted by
…show more content…
What is a 3 way hand shake? Is it better than 2 way hand shake?
In a Network, a 3 way handshake is a method used to create a connection between a local host or client and a server. Basically requires three steps from both the client and the server to exchange SYN and ACK packets before any communications begins. First the client sends a SYN packet asking the server if is open for a new connection, then the server responds with a confirmation packet or SYN/ACK, to what the client responds with an ACK packet and the connection is established.
3 way hand shake is better because the server gets the confirmation from the client that a SYN/ACK was received. With the 2 way handshake the server does not get any confirmation so the connection is closed.
6. When do we use Upward Multiplexing and Downward Multiplexing?
The Upward Multiplexing strategy is used by the transport layer to group transport connection base on their destinations. By mapping the groups to the minimum number of network connection, this application is very beneficial especially when the network connections get
…show more content…
This strategy works by opening multiple network connections to distribute the traffics equally but we have to mention that this can be accomplished as long as the data links in the subnet are able to handle the capacity.
7. Suppose we design a reliable transport protocol that use only NAKs as feedback from receiver to sender:
• If the data rate is low (sender sends packets infrequently), is a NAK-only protocol better than an ACK-based protocol? Why? o In this case a NAK-only protocol will not be better because such protocol only detects lost of packet when a following packet is correctly received, consequently this can represent long error recovery time.
• if the data rate is high and the network drops only a small number of packets is a NAK-only protocol better than a ACK-based protocol? Why? o When the rate is high an ACK-based protocol is not appropriate because of the high overhead. If data rate is high NAK’s are sent occasionally oppose to ACKs never sent representing a significant reduction of feedback. So recovery under NAK could be faster.
8. What are the 3 transport layer services?
These services

Related Documents

  • Decent Essays

    In order to provide reliability and quality of service (QoS) rules or policies that prioritize packets for outbound port queue will be in implement to meet the bank management requirement. The Internet and WAN connection will use multi-protocol label…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Mirroring provides fault tolerance. 2. Stripping improves access spread. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Kerberos authentication protocol that establishes a trusted connection between hosts in the untrusted network. The key function of this protocol is that it allows a single sign-on in a distributed network. It's best features lays in the fact that the password does not get shared over the network between nodes. In addition, it uses KDC - key distribution center which keeps the access maintained.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    A routing loop is a situation that occurs between two or more routers in which a packet is continuously routed between the routers as a result of irregularities from the routing algorithms and/or the routing tables of the routers. (routing loops, 2015). An example is when three routers are connected in a triangular pattern i.e. router A is connected to router B, router B is connected to router C and router C is connected to router A, when the network is converged, all three routers will have sent their routing tables to their neighbors. If router C goes down and router B tries to send a packet to C at the same time the router went down before it receives an updated table from router A, it will look into its routing table and it sees that router A can get to C, so it will update its route to C through A and will send the packet through router A. the same thing happens when router A receives the packet from router B, since it received no update on a change from B, it also checks its table and sees that B can get to C, so it updates its route to C through B and sends the packet to B and the packet keeps getting sent this way until the maximum hop count is reached…

    • 677 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CPSC 558 — Adv Networking — Lab Assignment – Simple Data Link A1: Simple Data Link Introduction Build one data line between two nodes, that can send and receive a text string of ‘1’s and ‘0’s. We transmit the string "10010" in one direction and reply with the string "01101". Implementation Language: C++ (or C) Implementation Structure…

    • 888 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Web server A web server processes requests using HTTP, the most basic network protocol used for information on the World Wide Web. HTML is the most frequent protocol for WWW and it may include images, scripts and style sheets in addition to text content. A user agent (eg. a browser) communicates by requesting a specific set of data using HTTP.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    One that you see almost everywhere is the handshake. You are supposed to use your right hand because most people are right handed and the left hand is sometimes considered to be an unclean hand. When meeting someone a handshake is a must do because it is a form of respect and you are supposed to use a firm handshake. You are not supposed to use a handshake when meeting a women because you are supposed to hug them instead. Gestures are a huge part communication in the U.S..…

    • 1253 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Timely updation improves the quality of network services, without incurring extra…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Why a Second Language Should Be Required Imagine traveling to a different country and getting to communicate to the land people. Imagine a person applying for a high paying job and getting hired because their brain able to retain and study information. Imagine a person’s brain being so far along compared to others that it delays the onset of diseases. All of these things are factors students will receive when learning a foreign language. Students should be required to learn a foreign language in school because it better equips their brain, knocks out competitors in the job market, and improves brain health.…

    • 1794 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays