Assume the RRA protocol is in use. How long should servers retain unacknowledged reply data?
Should servers repeatedly send the reply in an attempt to receive an acknowledgement?

What will be an ideal response?


The timeout period for storing a reply message is the maximum time that it is likely for any client to a re
transmit a request message. There is no definite value for this, and there is a trade-off between safety and buffer
space. In the case of RRA, reply messages are generally discarded before the timeout period has expired
because an acknowledgement is received. Suppose that a server using RRA re-transmits the reply message
after a delay and consider the case where the client has sent an acknowledgement which was late or lost. This
requires (i) the client to recognise duplicate reply messages and send corresponding extra acknowledgements
and (ii) the server to handle delayed acknowledgments after it has re-transmitted reply messages. This possible
improvement gives little reduction in storage requirements (corresponding to the occasional lost
acknowledgement message) and is not convenient for the single threaded client which may be otherwise
occupied and not be in a position to send further acknowledgements.

Computer Science & Information Technology

You might also like to view...

Why is the following markup invalid?

```

Here’s some text...


And some more text...

```

Computer Science & Information Technology

On a token ring network, a packet is a special series of bits that function like a ticket, allowing the device with the packet to transmit data over the network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ operation codes are restricted to be used in the operating system or other system software.

A. Privileged B. User C. Specialized D. System

Computer Science & Information Technology

Testing  that validates a program by ensuring that all of its statements have been executed-that is, by knowing exactly how the program is written-is ____.

A. Blackbox testing B. Destructive testing C. Nondestructive testing D. System testing E. Whitebox testing

Computer Science & Information Technology