Design a reliable byte-stream protocol

Assignment Help Basic Computer Science
Reference no: EM131045868

You are hired to design a reliable byte-stream protocol that uses a sliding window (like TCP). This protocol will run over a 1-Gbps network. The RTT of the network is 140 ms, and the maximum segment lifetime is 60 seconds. How many bits would you include in the Advertised Window and Sequence Num fields of your protocol header?

Reference no: EM131045868

Questions Cloud

What is the maximum delay a packet might face : Suppose a router has accepted flows with the TSpecs shown in Table 6.6
Describe an application of epidemiology and give a current : Describe an application of epidemiology and give a current, real world example of it.
Journal entries to record the transactions of sage ltd : Required: Prepare the journal entries to record the transactions of Sage Ltd up to and including that which took place on 28 March 2016. Show all relevant dates, narrations and workings
Why would the receiver need an extra timer : Why would the receiver need an extra timer if it were responsible for reporting that its advertised window had become nonzero (i.e., if the sender did not probe)?
Design a reliable byte-stream protocol : The RTT of the network is 140 ms, and the maximum segment lifetime is 60 seconds. How many bits would you include in the Advertised Window and Sequence Num fields of your protocol header?
Local police department in order for department : 1. Suppose that a local government decides to provide more funds to the local police department in order for the department to hire additional police officers.  Is there an opportunity cost of this action?  If so, how would you ..
Full amount of the instrument with interest : $900.00 Smalltown, Illinois Maker, November 15, 2011 The undersigned promises to pay to the order of John Doe Nine Hundred Dollars with interest from date of note.
Explain the difficulty of doing this over a tcp connection : Suppose a host wants to establish the reliability of a link by sending packets and measuring the percentage that are received; routers, for example, do this.
What would happen if a later sent 200 bytes of data to b : Suppose the third party sends each end such a forged 100-byte data packet ostensibly from the other end. What happens now? What would happen if A later sent 200 bytes of data to B?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  It systems that have affected business

Identify five different IT systems that have affected business in the past few years. For each system, briefly note the following: A name for the system

  Write the code segment needed to set the data variable

Write the code segment needed to set the data variable to 25, and the tag string to "Hello World".

  What other snmp information might be considered sensitive

What other SNMP information might be considered sensitive?

  Determine if pvss has ever conducted an audit

Your project lead has asked you to determine if PVSS has ever conducted an audit. After further investigation of the situation, you determine that this will be the first review that PVSS has conducted or to which it has been subjected. Your project l..

  Floating point numbers in scientific notation

Floating point numbers in scientific notation represents numbers as a base number and an exponent. For examples: 2E3, 2.0E12, 3.14E+12, 3.14E-12. Give a grammar that generates floating point numbers. Use your grammar to derive 3.14E+12.

  How the different tasks will play a part in future career.

How the different tasks will play a part in your current position or future career.

  Determine slas are necessary and identify monitoring points

Determine if internal service-level agreements (SLAs) are necessary, and identify the monitoring points and levels for an SLA

  Circular path and capable of terminating

If I am currently located at any node (let's call it A) and I want to find another specific node (let's call it B), what kind of algorithm would be most efficient in finding node B without getting stuck in a circular path and capable of terminatin..

  Should employees be allowed to text message

Should employees be allowed to text message each other during the meeting? As a manager, are there concerns you might have if employees have digital cameras on their cell phones? Read the responses of a few of your classmates. Do you agree with th..

  What do you mean by speaker adaptation

What do you mean by speaker adaptation? how it useful to reduce the computational load of the system

  What computations would reflect this behavior

Assume that the channel is fast but process Q is significantly slower than P. What computation would reflect this behavior? Give examples. Explain.

  Purpose of defining a framework for it security policies

How could the Japanese Coast Guard write an effective data disposal policy?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd