0% found this document useful (0 votes)
80 views2 pages

Unit 6 CS 2204 Assignment

1. To transfer 2000 bytes of user data over Ethernet with its 1500 byte maximum payload, two IPv4 fragments are needed - the first with 1480 bytes and the second with 520 bytes. Fragmentation divides the original datagram into smaller pieces that fit in the MTU, and each fragment header includes flags and identifiers to indicate its position and the original datagram. 2. RPC has issues including tight coupling between caller and callee that requires matching signatures, security reliance on firewalls/VPNs, and scalability bottlenecks with high request volumes. 3. Timestamps in RTP allow synchronization and timing recovery at the receiver by indicating sample capture time and calculating jitter and round-trip time, which is

Uploaded by

Zodwa Mngometulu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views2 pages

Unit 6 CS 2204 Assignment

1. To transfer 2000 bytes of user data over Ethernet with its 1500 byte maximum payload, two IPv4 fragments are needed - the first with 1480 bytes and the second with 520 bytes. Fragmentation divides the original datagram into smaller pieces that fit in the MTU, and each fragment header includes flags and identifiers to indicate its position and the original datagram. 2. RPC has issues including tight coupling between caller and callee that requires matching signatures, security reliance on firewalls/VPNs, and scalability bottlenecks with high request volumes. 3. Timestamps in RTP allow synchronization and timing recovery at the receiver by indicating sample capture time and calculating jitter and round-trip time, which is

Uploaded by

Zodwa Mngometulu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

To transfer 2000 bytes of user data with a single UDP send over standard 1500 byte Ethernet max
payloads, two IPv4 fragments will be needed. The first fragment will contain 1480 bytes of user data and
the second fragment will contain 520 bytes of user data. The fragmentation process involves dividing the
original IP datagram into smaller fragments, each of which can fit into the maximum transmission unit
(MTU) of the network. The IPv4 header of each fragment includes a flag to indicate that it is a fragment,
an offset to indicate its position in the original datagram, and a unique identification number to identify
the original datagram.

Source:

Forouzan, B. A. (2013). Data communications and networking. McGraw-Hill Education.

2. RPC has a few problems, which are:

- Tight coupling: RPC requires the caller and the callee to agree on the method signature, protocol, and
data types. Any changes in the method signature or data types require changes in both the caller and
the callee, which can lead to tight coupling and maintenance issues.

- Security: RPC relies on network security measures, such as firewalls and VPNs, to protect against
unauthorized access and attacks. However, these measures can be complex to set up and maintain, and
may not provide sufficient protection against sophisticated attacks.

- Scalability: RPC can become a bottleneck in large-scale distributed systems, as it may not be able to
handle high volumes of requests and responses efficiently. This can lead to performance issues and
system failures.

Source:

Birrell, A. D., & Nelson, B. J. (1984, October). Implementing remote procedure calls. In ACM SIGOPS
Operating Systems Review (Vol. 18, No. 6, pp. 32-40). ACM.

3. Timestamping is needed in real-time applications, particularly in the context of Real-time Transport


Protocol (RTP), to ensure timely and accurate delivery of multimedia data. Timestamps are added to
each RTP packet to indicate the time at which the data was captured or sampled, and to facilitate
synchronization and timing recovery at the receiver. Timestamps are also used to calculate the
interarrival jitter, which is the variation in packet arrival times, and to estimate the round-trip time (RTT)
between the sender and receiver, which is used to adjust the packet transmission rate.

Source:

Perkins, C. (2003). RTP: Audio and video for the Internet. Addison-Wesley Professional.
4. UDP exists as a transport protocol that provides a lightweight, low-latency alternative to TCP for
applications that do not require reliability or congestion control. UDP is used when the speed and
efficiency of data transfer are more important than accuracy and completeness. It is often used for real-
time and multimedia applications, such as video streaming and online gaming, where small delays or
packet loss are tolerable.

User processes could send raw IP packets, but this would require them to handle many low-level details,
such as fragmentation, reassembly, and error detection, that are typically handled by transport
protocols like UDP or TCP. In addition, using raw IP packets would not provide the level of abstraction
and functionality that transport protocols offer, such as port numbers and checksums.

Source:

Forouzan, B. A. (2013). Data communications and networking. McGraw-Hill Education.

5. QUIC (Quick UDP Internet Connections) eliminates a couple of RTTs (Round Trip Times) usually
needed at the start of a secure web connection by using several techniques. One of these techniques is
called 0-RTT (Zero Round Trip Time) mode, which allows the client to send encrypted data to the server
in the first message of the connection, without waiting for the server's response. This is possible
because the client can store the necessary cryptographic keys and parameters from a previous
connection to the same server, and use them to encrypt and authenticate the data in the first message.
The server can decrypt and verify the data using the stored keys and parameters, and respond with its
own encrypted data in the second message.

Another technique used by QUIC is called "connection migration". This allows a QUIC connection to be
moved from one network path to another, without having to renegotiate the cryptographic keys and
parameters or restart the connection. This can reduce the latency and improve the reliability of the
connection, particularly in mobile or wireless networks where network conditions can change
frequently.

Sources:

- Iyengar, J., & Thomson, M. (2015, July). QUIC: An UDP-based secure and reliable transport for HTTP/2.
In Proceedings of the 2016 ACM SIGCOMM Conference (pp. 265-278). ACM.

- Langley, A., Ritter, E., & Maruyama, K. (2017). The QUIC transport protocol: Design and Internet-scale
deployment. IEEE Journal on Selected Areas in Communications, 35(9), 2135-2144.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy