Specify protocol by listing the different messages

Assignment Help Computer Networking
Reference no: EM1355856

Q1) Suppose you wish to close a bank branch and introduce a teller machine. Your company has won the tender to develop an application-level protocol to be used between an automatic teller machine and a bank's centralized computer.
There are the following requirements that must be satisfied:

Your protocol should allow a user's card and password to be verified, the account balance (which is maintained at the centralized computer) to be queried, and an account withdrawal to be made.

Your protocol entities should be able to handle the all-too-common case in which there is not enough money in the account to cover the withdrawal.

Your tasks are as follows:

a. Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by providing the message structure.
Using a timing diagram provide a figure that shows the operation of your protocol for the case of a simple withdrawal with errors (i.e., insufficient balance).

Reference no: EM1355856

Use a search engine to identify

Use a search engine to identify the positions of Google and Apple regarding cell phone tracking. What reasons do the give for tracking cell phones? What limitations do you t

Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

Display all the last names from the customers table

Display all the Last Names from the Customers table and any associated OrdersIDs from the Orders Table. Show the Last Name even if they do not have any associated orders. Or

How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages

Advantages and disadvantages of simultaneous tcp connections

Can you configure the browser to open multiple simultaneous connections to the Web site? Write down the advantages and disadvantages of having large number of simultaneous T

Design and implement a simple network protocol

Design and implement a simple network protocol that can be used to download files from a remote site and to upload files to a remote site, and a client and a server programs

Describe quality-of-service

You were hired as a network engineer for a small firm that had just recently implemented a voice-over Internet protocol (VoIP) solution in its converged network, which had r

Program to accept bit string and generates unipolar encoding

Write program to accept a bit string and generates the unipolar, NRZ and Manchester encodings for the bit string. You can use any programming language/platform and generat

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd