Start the “TCP/IP” (reliable connection simulator) applet. In the text

 

  1. Start the “TCP/IP” (reliable connection simulator) applet.
  2. In the text field labeled “Your message:”, type the following: “Computer networking is essential in our world today.“. Then press the button “Send a message.”
  3. Watch the entire sequence of packets that are sent for the sample message. How many “DAT” packets were sent? How many “ACK” packets were sent?
  4. If each character or blank in a packet header counts for one character, and all “DAT” packets except the last carry 10 characters (including the blanks), and “ACK” packets have no data characters (though they do have a header), count up how many characters were sent in total.
  5. There are 52 characters in the above message, including blanks and punctuation. Subtract 52 from the total number of characters sent in both directions in all packets. Divide this number by the total number of characters to get the overhead (those characters which are not really data but yet you have to transmit them), represented as a percentage.
  6. Imagine that you have a million-character message to send, perhaps a large file. How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
  7. What would be an obvious way to decrease the overhead?
  8. Repeat Steps 1 and 2.
  9. Select “Delete packets that are touched“.
  10. Delete some data packets by clicking on them as they move along the wire and watch the retransmission after timeout.
  11. What happens if you delete the re-transmitted packet?
  12. Now try deleting some ACK or NAK packets. What happens?
  13. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don’t select the last packet because it might be too short, less than 10 characters. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.
  14. Using the “Text Encoding in ASCII” applet, type in the characters from the data packet, and click on “translate text“.
  15. Add up the values for each of the characters. Then calculate the modulus of this number using 256.
  16. Compare your manually computed checksum for the first packet of the message “Introduction to Computer Science” against what the applet shows for the packet. Do they match?
  17. Now damage your packet by altering one character. Re-compute the checksum. You should realize how the applet can spot errors.
  18. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version. Give one example for this scenario.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

How does a relational database management system help businesses make

How does a relational database management system help businesses make better decisions? Respond to this question by answering the following: What are the advantages and disadvantages of using a relational database management system? Find a case study in one industry, e.g. e-commerce, finance or healthcare. Research on how they design

   Students maintained and submitted weekly reflective narratives throughout the course

   Students maintained and submitted weekly reflective narratives throughout the course to explore the personal knowledge and skills gained throughout this course. This assignment combines those entries into one course-long reflective journal that integrates leadership and inquiry into current practice as it applies to the Professional Capstone and Practicum course.

Using r esources such as the Internet r esearch various

Using r esources such as the Internet r esearch various personality t ests and select one free t est to attempt. After attempting the t est, write a 2 or 3- p age r eport in a Microsoft Word document that includes the following: A brief description of the t

Discussion – Family Inclusion Directions: Initial Post: Describe how your

 Discussion – Family Inclusion Directions: Initial Post: Describe how your current (or future program) includes all families, especially those who may include a child with exceptional needs. Choose three family structures and share how your program (this is childcare/daycare) does or will support their unique family system. If there is

No AI  PLEASE SEND TURNITIN REPORT  Write a paper identifying techniques that could be done to disrupt the school-to-prison pipeline. Please include free

No AI  PLEASE SEND TURNITIN REPORT  Write a paper identifying techniques that could be done to disrupt the school-to-prison pipeline. Please include free or low-cost techniques, as well as more in-depth, systemic-level techniques that can lead to change. Please be creative and concise. More specifically, please address the following points in your paper: Post

Boomerang and failure-to-launch are key terms used to describe young

  Boomerang and failure-to-launch are key terms used to describe young adults living at home. Boomerang has been connected to young adults who left home for a period only to return. This return could be for several reasons, including but not limited to continued education, divorce, or loss or lack

GCU Change and Conflict Analysis Nursing Assignment Help

You are the site manager for a health care center caring for an urban population experiencing homelessness. After the identification of patient safety concerns, you have realized the need to institute a new quality initiative regarding how patients’ home medications are stored when they are admitted. This new initiative involves

Assignment Details Part 1: Review the U.S. Department of Justice

Assignment Details Part 1: Review the U.S. Department of Justice definition of a gang. Part 2: Invent a fictional character and select at least 3 specific elements, known or unknown to them, that might have influenced their decision to join a gang. Consider the following: Their parental influences  Community  Home

Read chapter 18and 19of the class textbook and review the attached

Read chapter 18and 19of the class textbook and review the attached PowerPointpresentation. Once done answer the following questions; 1. Discuss the cultural development of the Japanese and the Jewish heritage. 2. What are the cultural beliefs of the Japanese and Jewish heritage related to health care and how they influence

Using the Walden Writing Center APA Course Paper Template, write

  Using the Walden Writing Center APA Course Paper Template, write a 4- to 5-page paper review of the study of victimology in which you complete the following: Define victimology in your own words in 4–5 sentences. In approximately 1–2 pages, provide a brief history to include the victims’ rights

LUO Health & Medical Question Nursing Assignment Help

POLICYSTUDYASSIGNMENTINSTRUCTIONS OVERVIEW You will complete 2 policy studies in this course: Policy Study 1: Health Insurance Portability and Accountability Act. Policy Study 2: Medicare Access and CHIP Reauthorization Act. INSTRUCTIONS Research each policy and respond to the discussion questions below. 1. How has the health policy transformed health care delivery?

MDC Analysis of Obesity and Mental Health Discussion Nursing Assignment Help

This discussion goes hand and hand with data analysis plan assignment 1. This week, you will be submitting a data analysis plan for your research proposal. Share your research questions and research project as well as your anticipated type of quantitative analysis with the class. What quantitative test/s are you

Assignment Content Explore the OIG Enforcement Actions page. Review and

Assignment Content   Explore the OIG Enforcement Actions page. Review and select one of the articles on a case of health care fraud (MUST CITE) Write a 700- to 1,050-word analysis of the case that includes the following:  > Introduction > Summarize the incident and the specific fraud that was

Common law

Description Common law was established over many years,  PAPER WRITING INSTRUCTIONS  not less than 1000 words. Papers are to be submitted in Arial Font 12. Single-spaced. Footnoted and with Bibliography. Referencing is to be MHRA. MHRA is the referencing style employed in the course textbook. Please make sure you fully

discuss in detail subcultural theory as it relates to delinquency

 discuss  in detail subcultural theory as it relates to delinquency and crime.  Further briefly without using quotes give an overview of this article  i.e., Nwalozie, C. J. (2015). Rethinking subculture and subcultural theory in the study of youth crime – A theoretical discourse. Journal of Theoretical & Philosophical Criminology, 7(1),

: While reading a news article on your favorite athletic

: While reading a news article on your favorite athletic shoes, you are surprised to learn the company uses child labor in Pakistan. Living in the United States, it is hard to imagine children working in factories. What is child labor? According to the International Labor Organization, child labor is

Explain what an athletic trainer would ascertain from manual muscle

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.