Nt1330 Unit 3 Problem Analysis Paper

Decent Essays
Inspite of its conceptual elegance, RPC (Remote Procedure Call) have a few problems. Discuss any 3 of those in brief.
Often times it is unclear who the client is and who the server is in certain situations, in these types of situations RPC would not be suitable. RPC also makes unexpected messages hard or impossible to send if the receiver of the message is not expecting the message. Also RPC does not allow multi-threaded servers even when one would be appropriate(Tanenbaum & Renesse, n.d.).

2.Why is timestamping needed in Real Time Applications? (This is in context to RTP)

Time stamping allows for the synchronization of data packets. While RTP doesn't actually provide the synchronization, it does provid the necessary information to the
…show more content…
If the server sends a file to the receiver, and it receives it near the end of the packet lifetime, then the ACK may take longer to receive then what is left on the packet lifetime, so the server may send another packet before it receives the ACK leading to duplicate packets.

4.Give one potential disadvantage when Nagle's algorithm is used on a badly congested network.

A big problem can occur when Nagle's algorithm is used alongside Delayed ACK, another method used to help prevent congestion which could possibly be used on a badly congested network. Basically there is a chance that they will work against each other, Nagle's algorithm won't send it's last packet unless it gets an ACK, but the delayed ACK won't be sent because the server still doesn't have all the data it needs. This can cause a slowdown if the buffer sze is 100,000 bytes (Cheshire, 2005).

5.Why does UDP exist? Would it not have been enough to just let user processess send raw IP packets?

We could use IP to send information between hosts, but we would have no way of knowing which application it needs to go to since information about port numbers is isn't known by IP, but it is by UDP. So UDP allows information to be sent to the correct applications since UDP uses source and destination ports(Cnicutar,

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Mirroring provides fault tolerance. 2. Stripping improves access spread. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Using WSUS also conserves bandwidth, because all the client systems will…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    That is you can directly sync the files to another person’s computer while sharing files via Dropbox and you’re on the same…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The amount of data that must be transmitted through the Internet increases exponential, new applications such as RealAudio, Real Video, Internet Phone software and videoconferencing systems need a lot more bandwidth than the applications that were used in the early years of the Internet, this means that without any bandwidth control, the quality of these real-time streams depends on the bandwidth that is just available. Low bandwidth or better unstable bandwidth causes bad quality in real-time transmissions, for instance dropouts and hangs [9]. The quality of a service (QoS) is a vague term and can encompass a number of attributes. To some people a good service is one with a low end-to-end delay and high bandwidth, to some people a good service is an extremely reliable one with very few packet drops, while others would enjoy a predictable service regardless of the bandwidth or the end-to-end delay [10]. Various QoS characteristics are divided in two groups, technology- and user-based QoS parameters.…

    • 493 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Timely updation improves the quality of network services, without incurring extra…

    • 1381 Words
    • 6 Pages
    Improved Essays