EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 4, Problem P18P
Program Plan Intro

Transmission Control Protocol (TCP):

  • TCP is an internet protocol used for exchanging of data between the sender and the receiver. It is a secured protocol for transferring the data.
  • When the sender sends data to the receiver, he/she waits for the acknowledgement from the receiver.
  • If acknowledgement is received then the next data packet will be sent and the process continues till all the data packets are sent.
  • If acknowledgement is not received then the receiver is assumed as hacker or intruder and the connection will be removed.

Network Address Translation (NAT):

  • NAT is a method which is used to connect numerous numbers of computers to the internet using a single Internet Protocol (IP) address.
  • It offers the home users who using multiple computers which are used by the family members at home to connect with the internet and small businesses a cheap and efficient internet connections.
  • Usually, most of the companies use more than one router to connect with the internet.
  • But after installing NAT, the mapping is kept only at a single router. Thus, it is essential to use a same router to connect with the internet.
  • Multi-homing with more routers using NAT can be done by using the same router for a single connection and thus mapping is done properly.

Blurred answer
Students have asked these similar questions
In this problem we'll explore the impact of NATS on P2P applications. Suppose a peer with username Arnold discovers through querying that a peer with username Bernard has a file it wants to download. Also suppose that Bernard and Arnold are both behind a NAT. Try to devise a technique that will allow Arnold to establish a TCP connection with Bernard without application specific NAT configuration. If you have difficulty devising such a technique, discuss why.
We will examine the effect of NATs on P2P applications in this problem. Suppose a peer with Arnold finds that a peer with Bernard username has a file to download. Suppose also that both Bernard and Arnold are behind a NAT. Try to formulate a technique that will permit Arnold to create a TCP link to Bernard without a special NAT application setup. If you have trouble developing such a strategy, please explain why.
We will examine the effect of NATs on P2P applications in this problem. Suppose a peer with Arnold finds that a peer with Bernard username has a file to download. Suppose also that both Bernard and Arnold are behind a NAT. Try to formulate a technique that will permit Arnold to create a TCP link to Bernard without a special NAT application setup. If you have trouble developing such a strategy, please explain why.qap
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education