Please help with this Computer Networks question, thank you

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Please help with this Computer Networks question, thank you

For each network reliability issue, choose only one technique
that can be used to mitigate it and explain why. The list of
mechanisms includes (i) Timeouts, (ii) Sequence Numbers,
and (iii) Acknowledgements.
a) Packet loss in transit
Transcribed Image Text:For each network reliability issue, choose only one technique that can be used to mitigate it and explain why. The list of mechanisms includes (i) Timeouts, (ii) Sequence Numbers, and (iii) Acknowledgements. a) Packet loss in transit
Expert Solution
Step 1Explanation

This service abstraction is carried out by a secure data transmission protocol. 
The fact that the layer under the secure protocol of data transmission may not be reliable makes this job challenging. TCP, for example, is a trustworthy data transfer protocol applied on an untrustworthy end-of-the-network layer. 
More commonly a single physical connection could be part of the layer below the two securely communicating endpoints, e.g. in the case of a link-level data transmission protocol or, as with the transportation level protocol, a global Internet connection.
 But we can see this lower layer clearly as a point-to-point insecure channel for our purposes.
But how long does the sender have to wait to make sure anything is lost
It obviously needs to wait at least as long as the sender and receiver have a round trip time (which may require buffering on intermediate routers or gateways), plus any time required for transmitting the packet on the receiver.
 This maximum delay is very difficult to even predict in many networks, far less surely understood.
 In addition, it is preferably acceptable that the protocol recovers from packet failure as quickly as possible
It may entail waiting until the worst time possible before errors have been recovered. The solution thus taken in practice is that senders pick a time value "judiciously',' which would certainly cause packet loss, but not guaranteed. 
The packet would be sent if an ACK is not received in that moment. Please remember, if a packet is especially overdue, the sender will forward the packet even though the data packet is not one.

 

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Mobile Devices
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education