-
Introduction to the BootCamp 3
-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
-
Understanding The Internet 14
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
Lecture2.7
-
Lecture2.8
-
Lecture2.9
-
Lecture2.10
-
Lecture2.11
-
Lecture2.12
-
Lecture2.13
-
Quiz2.1
-
-
Intro to HTML - HyperText Markup Language 73
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
Lecture3.9
-
Lecture3.10
-
Lecture3.11
-
Lecture3.12
-
Lecture3.13
-
Lecture3.14
-
Lecture3.15
-
Lecture3.16
-
Lecture3.17
-
Lecture3.18
-
Lecture3.19
-
Lecture3.20
-
Lecture3.21
-
Lecture3.22
-
Lecture3.23
-
Lecture3.24
-
Lecture3.25
-
Lecture3.26
-
Lecture3.27
-
Lecture3.28
-
Lecture3.29
-
Lecture3.30
-
Lecture3.31
-
Lecture3.32
-
Lecture3.33
-
Lecture3.34
-
Lecture3.35
-
Lecture3.36
-
Lecture3.37
-
Lecture3.38
-
Lecture3.39
-
Lecture3.40
-
Lecture3.41
-
Lecture3.42
-
Lecture3.43
-
Lecture3.44
-
Lecture3.45
-
Lecture3.46
-
Lecture3.47
-
Lecture3.48
-
Lecture3.49
-
Lecture3.50
-
Lecture3.51
-
Lecture3.52
-
Lecture3.53
-
Lecture3.54
-
Lecture3.55
-
Lecture3.56
-
Lecture3.57
-
Lecture3.58
-
Lecture3.59
-
Lecture3.60
-
Lecture3.61
-
Lecture3.62
-
Lecture3.63
-
Lecture3.64
-
Lecture3.65
-
Lecture3.66
-
Lecture3.67
-
Lecture3.68
-
Lecture3.69
-
Lecture3.70
-
Lecture3.71
-
Lecture3.72
-
Lecture3.73
-
-
Advanced HTML 28
-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
Lecture4.8
-
Lecture4.9
-
Lecture4.10
-
Lecture4.11
-
Lecture4.12
-
Lecture4.13
-
Lecture4.14
-
Lecture4.15
-
Lecture4.16
-
Lecture4.17
-
Lecture4.18
-
Lecture4.19
-
Lecture4.20
-
Lecture4.21
-
Lecture4.22
-
Lecture4.23
-
Lecture4.24
-
Lecture4.25
-
Lecture4.26
-
Lecture4.27
-
Lecture4.28
-
-
Intro to CSS - Cascading Style Sheet 71
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
Lecture5.8
-
Lecture5.9
-
Lecture5.10
-
Lecture5.11
-
Lecture5.12
-
Lecture5.13
-
Lecture5.14
-
Lecture5.15
-
Lecture5.16
-
Lecture5.17
-
Lecture5.18
-
Lecture5.19
-
Lecture5.20
-
Lecture5.21
-
Lecture5.22
-
Lecture5.23
-
Lecture5.24
-
Lecture5.25
-
Lecture5.26
-
Lecture5.27
-
Lecture5.28
-
Lecture5.29
-
Lecture5.30
-
Lecture5.31
-
Lecture5.32
-
Lecture5.33
-
Lecture5.34
-
Lecture5.35
-
Lecture5.36
-
Lecture5.37
-
Lecture5.38
-
Lecture5.39
-
Lecture5.40
-
Lecture5.41
-
Lecture5.42
-
Lecture5.43
-
Lecture5.44
-
Lecture5.45
-
Lecture5.46
-
Lecture5.47
-
Lecture5.48
-
Lecture5.49
-
Lecture5.50
-
Lecture5.51
-
Lecture5.52
-
Lecture5.53
-
Lecture5.54
-
Lecture5.55
-
Lecture5.56
-
Lecture5.57
-
Lecture5.58
-
Lecture5.59
-
Lecture5.60
-
Lecture5.61
-
Lecture5.62
-
Lecture5.63
-
Lecture5.64
-
Lecture5.65
-
Lecture5.66
-
Lecture5.67
-
Lecture5.68
-
Lecture5.69
-
Lecture5.70
-
Lecture5.71
-
-
Advanced CSS 49
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
Lecture6.8
-
Lecture6.9
-
Lecture6.10
-
Lecture6.11
-
Lecture6.12
-
Lecture6.13
-
Lecture6.14
-
Lecture6.15
-
Lecture6.16
-
Lecture6.17
-
Lecture6.18
-
Lecture6.19
-
Lecture6.20
-
Lecture6.21
-
Lecture6.22
-
Lecture6.23
-
Lecture6.24
-
Lecture6.25
-
Lecture6.26
-
Lecture6.27
-
Lecture6.28
-
Lecture6.29
-
Lecture6.30
-
Lecture6.31
-
Lecture6.32
-
Lecture6.33
-
Lecture6.34
-
Lecture6.35
-
Lecture6.36
-
Lecture6.37
-
Lecture6.38
-
Lecture6.39
-
Lecture6.40
-
Lecture6.41
-
Lecture6.42
-
Lecture6.43
-
Lecture6.44
-
Lecture6.45
-
Lecture6.46
-
Lecture6.47
-
Lecture6.48
-
Lecture6.49
-
-
Introduction to JavaScript 30
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
Lecture7.5
-
Lecture7.6
-
Lecture7.7
-
Lecture7.8
-
Lecture7.9
-
Lecture7.10
-
Lecture7.11
-
Lecture7.12
-
Lecture7.13
-
Lecture7.14
-
Lecture7.15
-
Lecture7.16
-
Lecture7.17
-
Lecture7.18
-
Lecture7.19
-
Lecture7.20
-
Lecture7.21
-
Lecture7.22
-
Lecture7.23
-
Lecture7.24
-
Lecture7.25
-
Lecture7.26
-
Lecture7.27
-
Lecture7.28
-
Lecture7.29
-
Lecture7.30
-
This content is protected, please login and enroll course to view this content!
Leave A Reply Cancel reply
You must be logged in to post a comment.
10 Comments
1. What makes the internet “fault tolerant”? Explain in your own words.
It is because of the redundancy in network routing paths.
2.What happens when one or more of these packets gets missing and fails to arrive at the destination?
If some packets are missing, it gets retransmitted or resend them and when they are completed and seen that all packets are there, TCP sign for a delivery and it is done.
(1)The internet is fault tolerant because there are many paths that packets can follow to get to the final destination.even if something goes wrong with a path there is an option for another path. Just like we can change our rout when driving if our first rout has a fault.
(2)The TCP won’t sign and the packet will be resend untill everything is complete.
(1)Redundancy and Resilience ,makes the internet “fault tolerant”.The term redundancy as refers to the internet means that there are multiple pathways and connections between its components.Redundancy ensures that if one pathway or connection fails ,data can still be routed through alternative pathways ,hence maintaining the flow of information.
(2) Mechanisms such as packet retransmission, error detection and correction work together to ensure the successful delivery of data from the server to the client . Through packet retransmission, when a packet fails to reach its destination,the receiving end can request the sender to retransmit the missing packet .This ensures that even if some packets are lost during transmission, they can be resend to ensure the complete delivery of the data .
1. What makes the internet “fault tolerant”? Explain in your own words.
Ans: What makes the internet fault tolerant is that the internet will always find its way in delivering data or information requested all the time by looking for the alternative least shortest path should anything go wrong like traffic congestion and what have you.
2. Data moving from one point to another (eg Server to Client), is broken down into many small pieces or packets and transmitted through different routes depending on internet traffic. What happens when one or more of these packets gets missing and fails to arrive at the destination?
Ans: TCP responsible for sending & receiving of data as packets won’t sign an acknowledgment that all packets requested were sent in full hence the server of the site where the information is being requested for has to resend and once TCP confirms that all the data or information broken down into packets are sent and assembled back at the client’s end is complete it acknowledges.
(1). Having option for path, by enabling data to be rerouted if one path is unavailable.
(2). The TCP. (Transmission control protocol) is responsible for the reliability of data transfer. TCP divides large data into smaller piece for transmission and reassemble these data at the receiving end. if the data are not complete or corrupted , TCP will make a request for retransmission of the data.
1. What makes the internet fault tolerant is the availability of different paths through which packets of data, which is the different pieces of broken data, travel through. These packets can travel at their own pace using the most efficient traffic while the TCP makes sure that the data are complete before it endorses it for approval. If the TCP doesn’t approve it which means that it not complete yet or in order they are resend.
2. When some pieces of the packets are missing, the TCP will not endorse it. In this case the missing packets are resend while the TCP vets them to make that they are complete and in order. Only then will it approve it for use.
1. The internet is fault tolerant because it uses:
– Redundant Paths: Multiple routes for data, so if one fails, another can be used.
– Decentralization: No single point of failure; many interconnected networks.
– Dynamic Routing: Routers find the best path for data in real-time.
– Protocols like TCP check for errors and resend lost data.
2. TCP enables reliable data transport by:
a. Each data packet is assigned a sequence number.
b. The receiver (usually the client e.g web browser when you access a website OR server e.g FTP server when uploading a file) sends an acknowledgment for each received packet.
c. If the sender (the client or server) does not receive an acknowledgment within a certain time, it assumes the packet is lost and retransmits it.
d. The receiver reassembles packets in the correct order using the sequence numbers.
If data is missing, the receiver identifies the missing packets by their sequence numbers and the sender retransmits them until all packets are successfully received and reassembled.
1). Fault tolerance in the Internet is the ability of many routers sending packets through the most available route to reach the designated IP address.
2).When there is or there are delayed or missing packets, the sever does not sign the packets available until the other packets arrive. So when there is an incomplete packets, the information does reach its destination as expected in whole. But when the remaining packets arrives, the information displays complete.
1. The internet is fault tolerant in the sense that the sending and receiving of information on internet keeps on going no matter the obstacle
2. Before the packets get delivered,the TCP cross-checks to see if they’re complete. If there’s a missing packet,it won’t get delivered until it’s complete
1. The internet is fault tolerant because packets of data have multi-route options to get to their destination so, “data” is rarely stranded.
2. TCP double-checks that the packet of data is complete before delivering to the client. If found incomplete it requests for the packets to be resent.