preview

Analysis Of Internet Protocol ( IP ) Datagrams

Decent Essays

1. Internet Protocol (IP) datagrams may arrive in a seemingly random order of chunks that the receiving IP entity must continuously collect until it can reconstruct the original datagram. Consider that the receiving IP entity possesses a buffer for assembling the original datagram's data field. The buffer will comprise of chunks of data and "holes" between them corresponding to data not yet received.
a. Describe an algorithm in pseudocode, prose, graphical, or any other representation, to collect and reconstruct the original datagram's data field based on this concept.
When sending a packet, the length of the packet can exceed MTU (Maximum Transmission Unit) of the network interface. In this case, the packet is split into fragments no …show more content…

A term "hole" is referred as partially assembled datagram that consists of certain sequences of octets that have already arrived, and the certain area still to come is known as "hole". To illustrate a simple mechanism for the tracking, management, and manipulation of holes between data chunks is referred to as per definition. For instance, when the earliest fragment of the datagram arrives, it may be being by creating an empty data buffer area add that entry in its hole descriptor list and that datagram entry is known as a missing entry. Therefore, a hole can be represented in a zero packet, which is an empty packet, and a hole that equals infinity is considered a very large integer, greater than 576 bytes.
2. Answer the following questions related to UDP:
a. What features does UDP provide that are not provided by IP?
There are two types of Internet Protocol (IP) traffic, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of the features that UDP possesses that are not provided by TCP/IP. First, UDP is a connectionless protocol (No handshake), which means packets sent from one node to another without making sure whether any packet may be lost during the transfer. TCP, on the other hand, makes sure to establish a connection in order to send the packets from one node to another without losing any packets. It is also known as handshake process, where nodes synchronize (SYN),

Get Access