Free Essay

Issc340

In:

Submitted By kitkat1203
Words 702
Pages 3
2. Literature Review

Many network applications are built on top of TCP. And many are continuing to be built on TCP in the future. Up to date studies show that several alternatives have been proposed to lessen the poor end-to-end performance of the unmodified TCP in the wireless medium. The protocols in this section will point out the advantages and disadvantages of each approach.
• Congestion Avoidance: It is assumed that all losses are due to congestion avoidance, which becomes quite problematic over wireless links. Congestion avoidance is a way to deal with lost packets. In packet-switched networks, packets move in and out of the buffers and queues of switching devices as they pass through the network. A packet-switched network is often referred to as a “network of queues”[W. Stevens 2]. A characteristic of packet-switched networks is that packets may arrive in bursts from one or more sources. Buffers help routers absorb bursts until they can catch up. If traffic is excessive, buffers fill up and new incoming packets are dropped. Increasing the size of the buffers is not a solution, because excessive buffer size can lead to excessive delay. Congestion can occur when data arrives on a fast LAN and gets sent out a slower WAN [Allen 2]. Congestion can also occur when numerous input streams arrive at a router whose output capacity is less than the sum of the inputs. Now, any host injects packets at anytime and those packets are variable in size, which makes predicting traffic patterns, and providing guaranteed service impossible.
• Slow-Start mechanism: A similar congestion detection mechanism is applied during slow-start to decide when to change to the congestion avoidance phase. A slow-start mechanism works by limiting the rate at which data is transmitted into the network. To have valid comparisons of the expected and the actual throughput, the congestion window is allowed to grow only on every other RTT (real time technology). When a router begins to transmit data into a Frame Relay network the swift increase in the amount of traffic may cause congestion in the network. Slow start minimizes the impact of increased network traffic and reduce the severity of any congestion. Older TCP’s would start a connection with the sender injection numerous segments into the networks, up to the window size advertised by the receiver ( Teltrend 4). While this is fine when the two hosts are on the same LAN, if there are routers and slower links between the sender and the receiver, problems can occur [Allen]. Some intermediate router must queue the packets, and it’s possible for that router to run out of space. Congestion avoidance and slow start are independent algorithms with different objectives. But when congestion occurs TCP must slow down its transmission rate of packets into the network, and then call upon slow start to get things going again. In practice they are implemented together. Congestion avoidance and slow start require that two variables be maintained for each connection: a congestion window (cwnd), and a slow start threshold size (ssthresh). • The Fast-Retransmit And Recovery Approach: This approach addresses the issue of TCP performance when communication resumes after a handoff. Unmodified TCP at he sender interprets the delay caused by a handoff process to be due to congestion (since TCP assumes that all delays are caused by congestion) and when a timeout occurs, reduces its window size and retransmits unacknowledged packets. Often, handoffs complete relatively quickly (between a few tens to a couple of hundred milliseconds), and the mobile host requires long waits before timeouts occur at the sender and packets start getting retransmitted. This is because of coarse retransmit timeout granularities (on the order of 500 ms) in. The fast retransmit and recovery approach lessens this problem by having the mobile host send a certain threshold number of duplicate acknowledgments to the sender. This causes TCP at the sender to immediately reduce its window size and retransmit packets starting from the first missing one (for which the duplicate acknowledgment was sent). The main drawback of this approach is that it only addresses handoffs and not the error characteristics of the wireless link [R.Caceres and L. Iftode 2].

Similar Documents

Free Essay

Issc340

...Wireless Security T 01/15/2015 ISSC340 American Public University System Eric Yocam When it comes to dealing with wireless security, it happens to be a problem for everyone. The rise in devices being made during the last decade has put a strain on the amount of data being requested by users. The statistics show that 64 percent of Americans who have internet service providers that impose a broadband cap, have a meter for the cap that is presented. Recent studies have shown that five out of seven people’s meters don’t count your bits correctly. This allows for the chance of assuming what data is being used and being overcharged for what is not actually used. Other statistics show that the laptops that were purchased in 2005 and later were equipped with wireless connectivity. This created an issue with wireless laptops connected to the corporate network, it presents a situation where a hacker could sit in the parking lot and receive information through laptops and other devices, or break in using the wireless card-equipped with this wireless connectivity option. In order to test the strength of most wired and wireless networks the intrusion detection system was implemented. This is a software application that monitors the network activity for malicious activity or privacy violations. The way this works, is that the incidents get reported to a management station. The two different types of intrusion detection system are (NIDS) network based and (HIDS) Host...

Words: 3051 - Pages: 13

Free Essay

Issc340 Week1Assignment

...Name: Date: October 11, 2014 ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) I LAN is define as a local area network which consist of a croup of computers that are within the same geographical location such as a home, or building, or even a group of small buildings. The architecture that builds a LAN all includes these components. First and foremost it is the actual network topology and how it is laid out, weather this is by wire or wireless. Next is the network operation system or NOS, which is what manages all the resources that are within the network. This is usually a server of some sort. Another main part of the network is the network interface card or NIC, this serves at the actual interface between the network and the computer. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operation system (NOS) can be defined as a management system on a network that enables the provisions of one or more client or clients. It is a component that runs within a server that provides multiple users within a network, also can provide file and print servers, can provide a gateway for internet access, and can also implement a wide array of network securities...

Words: 335 - Pages: 2

Free Essay

Issc340 Week 4

...Name: ___________________________Date: ____________________ ISSC340 Week 4 Assignment (3% of Grade) Lesson 4 Review: LAN Topologies The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. What are the two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously? (Min. word count: 15) Carrier sense multiple access methods are detection where a transmission is cancel when collision is detected and avoidance where transmission is delayed. Which topology would you use when unable to install network cable? (Min. word count: 15) Mesh topology because is provides has separate cables for each connection, meaning a cable can break without interfering with the rest of the network. What is inherent in mesh topologies that enable them to provide high reliability? (Min. word count: 20) Mesh topology provides fault tolerance by having separate cables for each connection, allowing any one cable to break without interfering with the rest of the network. What are advantages of star topologies? (Min. word count: 10) Star topology gives great fault tolerance as any device/cable failure will not affect the rest of the network. Compare the two modes supported by wireless topologies. (Min. word count: 20) In ad-hoc mode data in the network is transferred to and from wireless network adapters connected to PCs. An infrastructure network enables you to...

Words: 454 - Pages: 2

Premium Essay

Issc340 Week 1 Assignment

...Name: _Aaron Hancock_ Date: _12OCT2014_ ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components are 1: The network's physical topography (how the nodes are connected) 2: The access method (how the nodes access the transmission medium) 3: the transmission technique (how information passes through the network) 4: the transmission media (wired or wireless) 5: the use of specific protocols (the language used to communicate between computers) 6: the LAN's inter-connectivity (how the LAN shares with other networks) 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages the resources used within the network and enebles select services to select nodes. A NOS consists of two main components: a server component and a client component. The server component is the most complex component that runs on the server. The server component can do many things, to include; manage multiple users, provide access to files and printers, provide internet access, and enforce network security protocols. The client component runs on the client machine and enables the client to participate on the network. A NOS client component...

Words: 270 - Pages: 2

Free Essay

Issc340 Week 1 Assignment

...Name: Date: ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components of any LAN starts with the layout for how the nodes connect, the access method (which is how the node gain access to a transmission medium), the transmission technique (which is how the information passes through the network), transmission media (which is defined by either wired or wireless connections), the use of very specific protocols (which are sets of rules that define how the computers communicate and define the LANs interconnectivity), which then determines how the LAN shares information. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) One of the biggest differences between a Network Operating System and a regular operating system is that unlike the OS which can run a single computer, the Network Operating System can run multiple computer on a network at once and allow the network to continue running. The Network Operating System is an essential element of the LAN that can consist of server components and a client component. The server components have multiple responsibilities that can range from managing multiple users on a network, providing access to file...

Words: 297 - Pages: 2

Premium Essay

Issc340 Week 6 Assignment

...Name: Jerry Cunningham Date: 16 March 2015 ISSC340 Week 6 Assignment (3% of Grade) APUS/Sanford Lesson 6 Review: Transmission Media The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is the difference between standard voice-grade cabling and data-grade cabling? (Min. word count: 30) When determining the difference between voice-grade cabling and data-grade cabling, user much keeps in mind that twisted pair cables such as voice grade can support data speed of 19Kbp up to a distance of six miles. On the other hand data grade cabling have a speed of to 100 Mbps. 2. True or false: A diameter of a 22AWG twisted-pair cable is smaller than a 26AWG twisted pair cable? Explain… (Min. word count: 10) The answer would be false because due to being bigger in the numbers of AWG the diameter of the cable would be much smaller 3. In which frequency bands to do short-range wireless transmission operate? (Min. word count: 10) When dealing with frequency band short-range wireless operates in both 2.4(Ghz) microwave band and 5 (Ghz) band 4. What are the two types of light source used to transmit signals over optical fiber? (Min. word count: 10) According to textbooks, the two different types of light source use to transmit signals over optical fiber are: analog and digital data 5. True or false: Bluetooth is a good example of short-range wireless transmission...

Words: 297 - Pages: 2

Premium Essay

Issc340 Final Paper

...For over the past several decades, information technology companies have been striving to figure out new and more effective ways to ensure that their computers and associative equipment, as well as, their clients’ devices are secure from unwanted intrusions. As computers and other electronic devices become more sophisticated and start storing more and more personal information, which includes, but is not limited to the development of technologies such as the fiber-optics, satellite communications, Bluetooth and the innovation of cloud storage, users are attempting to ensure their personal items are safe. However, while device users are trying to ensure their items are secure, there are the opposing parties that are constantly attacking and attempting to infiltrate any and all defenses posed by a target computer. An attacker can gain personal information, such as finance data, including credit card information as well as account numbers, and other important information relevant to your life. These attempts can eventually lead to success and jeopardize the people being attacked. These attacks are becoming more sophisticated and complex as well, meaning not only that technologies need to be evolved and enhanced, but also that the user needs to be more conscious than ever of exactly what they are doing on their systems. According to Dictionary.com Network security is “The protection of a computer network and its services from unauthorized modification, destruction, or disclosure”...

Words: 3328 - Pages: 14

Premium Essay

Issc340 Week 1 Assignment

...Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are several main architectural components of a LAN. Included is the physical topology of the network determining how the nodes on the network are connected. Access methods are needed on the network to determine how the nodes will access the transmission mediums. The networks transmission techniques and the transmission media determine how the information will be passed throughout the network and if the network will use cables or be wireless. Protocols are a main component of a LAN because they lay out how the various machines will communicate between each other. The LAN’s interconnectivity is another main component because it determines how the information on its own network will be shared with other types of networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) allocates resources throughout the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS will be more complex than the clients because that runs the servers and consists of many more tasks. The server portion of the NOS will have many functions...

Words: 344 - Pages: 2

Free Essay

Issc340 Week 2 Assignment Lesson 2 Review: Wide Area Networks

...Name: ___ ____________ Date: __ 2013_________ ISSC340 Week 2 Assignment (3% of Grade) APUS/ Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) ____A T1 circuit is a DS1 WAN technology that is comprised of 24 x 64 kbps data channels and 1 x 8 kbps allotted for signal and network management for a total of 1.544 Mbps. It is versatile because data types can be divided into voice, video, and data channels from one T1. ________________________________________________________________________________________________________________________________________________________ 2. A statistical multiplexer provides each user with … (Word count: 15-25) ____bandwidth based on demand on the circuit as it is available. This is different and more efficient than TDM where each user is slotted a given bandwidth whether it is used or not. __________________________________________________________________________ ______________________________________________________________________________ 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) ____It provides the capability to add or extract part of the data payload without completely demultiplexing or remultiplexing the signal.____________________________ 4. Describe an ATM cell … (Word count: 15-25) ___ATM is a connection-oriented, packet-switching technology that...

Words: 299 - Pages: 2

Premium Essay

Issc340Wk1

...ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are six parts to the to the LAN architecture components which include the network’s physical topology, the access method, the transmission technique, transmission media, protocols, and LANs interconnectivity. The architecture is the layout of how the network will be connected. The access method is how a particular node (network component) will gain access to a transmission medium. The transmission technique is how data passes throughout the network. Transmission media is the connection to the network whether it be wired or wireless. The protocols are the set of rules that defines how the nodes will communicate with each other. Last but definitely not least is the interconnectivity which determines what and how information is shared. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) is what manages resources of the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS is the more complex portion because it is what manages who can access what resources. It is...

Words: 330 - Pages: 2

Premium Essay

Issc 340 Assingment 2

...Name: Fabian Calle-Calle Date: 11 Feb 2015 ISSC340 Week 2 Assignment (3% of Grade) Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) A T1 circuit is the most common connectivity method in the United States and Japan and it is 24 different channels of voice and data that carries signals at a speed of up to 1.544 mbps 2. A statistical multiplexer provides each user with … (Word count: 15-25) The ability to have a faster connection depending on the transmission trends by switching between channels according to the demand of the network 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) It provides the capability to add or drop part of the transmission payload without the overhead of completely demultiplexing and remultiplexing the entire signal. 4. Describe an ATM cell … (Word count: 15-25) It is a data frame that is always 53 bytes long that serves as the basic unit of ATMs packets switching technology 5. Which technologies provide affordable high-speed connections for home-based networks? (Word count: 15-25) There are three main methods of connecting to the internet that is available for an affordable price. Cable Internet which is the most common, and reliable this method provides a good amount of speed for a reasonable price. DSL connections is the cheapest high speed connection that...

Words: 302 - Pages: 2

Premium Essay

Avionics Tech

...ISSC340 Quiz 1 APUS Part 1 of 1 - 1.25/ 1.25 Points Question 1 of 5 0.25/ 0.25 Points The first three fields in an IPv6 address are equivalent to an IPv4 network ID. What is the term for this part of the address? Correct A.Site prefix B.Interface ID C.Subnet ID D.MAC address Answer Key: A Feedback: That is correct! Question 2 of 5 0.25/ 0.25 Points The IP address for Jack's laptop is 192.168.1.103. Which of the following statements about Jack's network is true? A.Jack's network is a server-based network. B.Jack's network is a directory-based network. C.Jack's network uses IPv6 addressing. Correct D.Jack's network uses private IP addressing. Answer Key: D Feedback: That is correct! Question 3 of 5 0.25/ 0.25 Points Which of the following components manages network resources and enables the provision of services to network clients? A.Internet Protocol version 6 (IPv6) Correct B.A network operating system (NOS) C.A network interface card (NIC) D.A non-dedicated server Answer Key: B Feedback: That is correct! Question 4 of 5 0.25/ 0.25 Points Any addressable and manageable device on the network other than the network cabling is referred to as a: Correct A.node. B.domain controller. C.back end. D.front end. Answer Key: A Feedback: That is correct! Question 5 of 5 0.25/ 0.25 Points Most home networks are: A.mainframe networks. B.server-based networks. Correct C.peer-to-peer...

Words: 275 - Pages: 2

Premium Essay

Week 5 Assignment

...Name: Charles Buchanan Date: 12/07/2014 ISSC340 Week 5 Assignment (3% of Grade) APUS/Sanford Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) Whenever we connect devices there must be away for one device to communicate to another. The three basic modes of operation annoy network are Simplex, Half-Duplex, and Full-Duplex operation. in simplex operation, a network cable or communication channel can only send information in one direction. Half-duplex operations are capable of sending information in both directions between nodes, but only one direction can be utilized at a time. Full-duplex operation is a connection between two devices and is capable of sending information in both directions simultaneously. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The Open Systems Interconnect (OSI) model has seven layers. The application, presentation, session, transport, network, datalink, and physical layers. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is an open system interconnection term use in telecommunications that refers to a group of information added or removed by a layer of the OSI model...

Words: 500 - Pages: 2

Premium Essay

My Paper

...Name: _Terrence Pryor__________________________ Date: 09/06/2014____________________ ISSC340 Week 3 Assignment (3% of Grade) APUS/Kageorgis Lesson 3 Review: Networking and the Internet The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is an extranet? (Minimum word count: 30) An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely._________________________________________________________________________________________________________________________________________________________________________________________________________________________________ 2. Describe the function of a firewall. (Minimum word count: 70) A firewall is a system designed to prevent unauthorized access to or from a private computer network. They are frequently used to prevent unauthorized Internet users from accessing private networks that are often described as intranets which are connected to the Internet.___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ 3. Which tunneling protocols are commonly...

Words: 300 - Pages: 2

Premium Essay

Issc340Week3

...ISSC340 Week 3 Assignment (3% of Grade) Lesson 3 Review: Networking and the Internet The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is an extranet? (Minimum word count: 30) An extranet is an internal network that allows users to share information without making it public. It is similar to a business library that allows only employees to have view the content. 2. Describe the function of a firewall. (Minimum word count: 70) The function of a firewall is to control the flow of information between the internet and private networks. The function of a firewall within a network is similar to a barrier door or gate. It serves as the first line of defense and assists in preventing network attacks. Another way to think of a firewall would be a security guard or metal detector. As information is passed to and from different networks, the firewall is inspecting and looking out for suspicious content. 3. Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) The four most commonly used tunneling types for VPN’s are L2TP, IPSec, PPTP, and SSL. L2TP is layer to tunneling protocol and does not provide encryption, IPSec is another an encryption and authentication method that is very time consuming and expensive. PPTP is point to point tunneling and the most supported by VPN. And SSL is secure socket layering and does require software installation. 4. Describe a differential backup...

Words: 386 - Pages: 2