How long does the session between A and B last, using connectionless communication? Explain.

In this exercise we will use a simplified mathematical model to analyze the tradeoff between connection-oriented communication and connectionless communication. Explain your answer.
On a certain network both forms of communication are provided:
• Using connection-oriented communication, it takes 50 second to establish a connection, after which a packet of up to 10 characters can be sent in 1.0 seconds over the connection, in either direction.
• Using connectionless communication, a packet of up to 10 characters can be sent in 1.2 second. (The sending of each packet takes slightly longer than in the connection-oriented case, since each packet must find its way to the receiver.)
Suppose A and B exchanges messages on this network. A initiates the communication and sends to B a message of 100 characters, which are partitioned into 10 packets. In reply, B sends a message of 50 characters, which are partitioned into 5 packets.
Assuming that there is no delay other than the time it takes for establishing a connection (in the connection-oriented case) and for packet transmission:


The session time is time for A’s data transfer + time for B’s data transfer = 1.2*10 + 1.2*5 = 18 sec

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Records in random-access files must be of uniform length. 2) Member functions seekp and seekg must seek relative to the beginning of a file. 3) Pointer-based code is complex and error prone—the slightest omissions or oversights can lead to serious memory-access violations and memory-leak errors that the compiler will warn you about. 4) deques offer rapid insertions and deletions at front or back and direct access to any element 5) lists are singly linked lists and offer rapid insertion and deletion anywhere.

Computer Science & Information Technology

For what are tools such as USMT and Tranxition used?

a. security b. marketing c. migration d. database structure

Computer Science & Information Technology

Which tool is used to exploit a target as well as perform information gathering?

A. Robtex B. Metasploit C. Th3Inspector D. theHarvester

Computer Science & Information Technology

SQL stands for Syntactical Question Language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology