Fsm packet sending and receiving protocols

Assignment Help Basic Computer Science
Reference no: EM13829773

Problem:

Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D. Suppose that the broadcast channel connecting A, B, C, and D can independently lose and corrupt messages (and so, for example, a message sent from A might be correctly received by B, but not by C and D). Design a stop-and-wait-like error-control protocol for reliably transferring a packet from A to B, C, and D, such that A will not get new data from the upper layer until it knows that B, C, and D have correctly received the current packet. Give FSM descriptions of A and B. (Hint: The FSM for C and D should be essentially the same as for B.) Also, give a description of the packet format(s) used.

Additional Information:

This problem is from Computer Science, particularly to Networking as well as it is about FSM packet sending and receiving protocols. A scenario has been stated in the solution.

Total Word Limit: 172 Words

Reference no: EM13829773

Questions Cloud

Router cidr entries for ip addresses : A router has the following (CIDR) entries in its routing table:
Explain human history during the paleolithic era : The problem is belongs to Sociology, mainly to human history during the Paleolithic era. The question is explains about whether or not the sources referred to in the book "Ways of the World -A brief Global History with Sources" by Robert W. Straye..
Create a comparison such as an analogy and metaphor : Describe your personal definition of differentiation. Create a comparison, such as an analogy, metaphor, or visual picture, of what differentiation means to you.
How will the company fare after his inevitable departure : In 1965, Warren Buffett acquired control of a New England textile business called Berkshire Hathaway for about $10 a share. Today the stock sells for around $90,000 a share and Mr. Buffett is the wealthiest person in the United States. How will the c..
Fsm packet sending and receiving protocols : Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D.
Compute the projects annual net cash flows : The Taylor Mountain Uranium Company currently has annual cash revenues of $1.2 million and annual cash expenses of $700,000. Depreciation amounts to $200,000 per year. These figures are expected to remain constant for the foreseeable future (at least..
Book review of bravo for the marshallese : Book Review of Bravo for the Marshallese
Example related to the issue of reporting human capital : Discuss an example related to the issue of reporting human capital in finance statement. offering examples of human capital being measured in the organization.
Complement in tcp and udp connections : UDP and TCP use the 1s complement for their check sums. Suppose you have the following three 8-bit bytes: 10011001, 01010010, and 01011001.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Explain security awareness and training document

Amy walked into her office cubicle and sat down. The entire episode with the blond man had taken well over two hours of her day. Based on this case study, what security awareness and training documents and posters had an impact in this event?

  A word document containing all of the identified methods

A word document containing all of the identified methods for the "Zoo Organizer"

  Lid technology approach to stormwater management

LID technology is the alternative comprehensive approach to stormwater management. It can be utilized to address wide range of Wet Weather Flow (WWF) issues.

  What does it mean if they are public or private

When creating classes you have member functions and member variables. What are they and what data types can you use for member variables

  Relative risk comes form inside the organisation

Write a report on relative risk that comes form inside organisation as opposed to risk which comes from external sources.

  New technologies have created new capabilities

New technologies have created new capabilities, including access, capture, speed, and permanence. Technology often has a more wide-ranging effect than the purpose for which it is chosen. As a result, advances in technology present both opportu..

  Code around in a file to add joptionpane

It requires us to change some code around in a file to add joptionpane dialog boxes in instead of the fields already there. The following is the exact wording of the assignment:

  Covering segments by points

Given n segments, find the minimal possible number of points such that each segment contains at least one point. The first line contains the number 1≤n≤100 of segments. Each of the following n lines contains two integers 0≤l≤r≤109 defining the endpoi..

  What fraction of bus cycles are available for dma transfer

Estimate the maximum transfer rate if DMA is used. For DMA access, assume one word is transferred for each bus cycle, and ignore any setup or status-checking time. Your answer from part B should be helpful for this calculation. million words /sec

  Environmental issues relating to consumption

The piece should be created based on one of the topics listed below and should relate to the Theme of Society and Technology: Investigation of Group Identity.

  Explain physical condition for alarm in logic truth table

Write truth table in the order of T P F L. Make sure to recognize corect physical condition for alarm in the logic truth table.

  What would be the best choice of the degree

A B+ - tree index is to be built on the name attribute of the relation student

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd