Explaining protocol to avoid defeat

Assignment Help Computer Networking
Reference no: EM1347726

Q1) You and Luke Sky Walker are commanders in the rebel army preparing to attack Darth Vader and his Death Star. By yourselves, neither you nor Luke possesses enough fire power to defeat Darth Vader, but together you can destroy the Death Star. However, you must come to agreement on the precise moment to attack, but you cannot communicate using the normal communications else your presence and location will be detected by Darth Vader.

But you each possess an unlimited number of R2D2 messenger droids that you can use to send messages to each other. But, the droids may be destroyed by the enemy's PatrolBots, so you have no way of knowing if your message gets through unless Luke sends a droid back to you with a confirmation message.

Suppose your droid gets through to Luke and Luke sends a droid back to you with a confirmation message agreeing to the time to attack, but it is destroyed by a PatrolBot? Should he attack? You haven't received a confirmation, so what will you do?

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

Reference no: EM1347726

Questions Cloud

How to draw free-body diagrams of blocks : A new General Electric kitchen stove has a mass of 68kg and the dimensions. The stove comes with a warning that it can tip forward if the person stands or sits on oven door when it is open.
Feature set of free helix forensics cd : Visit Helix web site and read about feature set of free Helix forensics CD. Note that documentation for Helix is not on CD, to keep it down to ~700MB.
Problem on bar expansion : Two sound speakers separated by a distance of 3-meters, are driven in phase by same audio amplifier. A listener sits directly in front of one speaker at a distance of 4 meters from it so that listener and speakers form a right triangle.
Direct material variances : This question is on variance analysis in managerial or cost accounting. More specifically, it asks for computations of direct material price variance, direct material efficiency or usage variance, the flexible budget variance, and determining whet..
Explaining protocol to avoid defeat : Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.
Collaboration process to achieve organizational goals : Discuss and explain the steps of collaboration procedure among the functional areas that must be employed to achieve organizational objectives.
Illustrate what expect would happen to coffee consumption : Illustrate what do you expect would happen to coffee consumption? In what direction would the CPI move, ceteris paribus? Would that change correctly reflect the impact on consumers' welfare? Explain briefly.
Prepare variance analysis report : Strauss Table Company manufactures tables for schools. The 20x4 operating budget is based upon sales of 20,000 units at $ 100 per table.
Calculate investors percentage holding period return : A shareholder bought ten Ellis Industries, long-term bonds one year ago, when they were 1st issued by the firm. Next Time, he bought 200 shares of the firm's common stock at the same time for $30 per share.

Reviews

Write a Review

Computer Networking Questions & Answers

  Wide area network by using frame relay technology

Site networks are connected to form wide area network using frame relay technology. Webservers located at each site provide access to information resources.

  Kind of networking hardware used-dsl for internet connection

Most homeowners select to install a DSL for Internet connection what kind of networking hardware would you suggest?

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Developments in adsl broadband technologies

Show practical and theoretical knowledge of LAN/Internet technologies

  Data communications and net-centric computing

List A below contains the layers of the internet protocol. List B contains items and applications associated with these layers. Recreate the answer table show below in your answer booklet and put the protocol layers in their correct order.

  Socio-technical perspective useful in organizations

How taking a socio-technical perspective can be more productive in helping organizations manage information overload than either technical solutions or organizational solutions alone?

  Classifying the signal

You are provided with some continuous signals for the number of sensors on a sensor array. The signals detect various categories of signals.

  Explaining security-aware caching resolver

Suppose a security-aware caching resolver receives DNS RRset at time t0 with signatures on it which expire at time t1 (where t0

  Small internet works

Prepare a network simulation

  Describe quality of service (qos) and explain the motivation

Describe Quality of Service (QoS) and explain the motivation behind QoS Referring to the diagram below, configure Routers 1, 2, and 4 with Internet Protocol (IP) addresses, and ping between them to test connectivity. Write down complete commands..

  Congestion control in error-free virtual circuit subnet

Consider the following method for congestion control in a error-free virtual circuit subnet.

  Explaining social networking in knowledge management

Social Networking is one of the hottest topics in knowledge management. Is it knowledge management?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd