Which protocol is used to avoid defeat

Assignment Help Computer Networking
Reference no: EM1368628

You and Luke Sky Walker are commanders in the rebel army preparing to attack Darth Vader and his Death Star. By yourselves, neither you nor Luke possesses enough fire power to defeat Darth Vader, but together you can destroy the Death Star. However, you must come to agreement on the precise moment to attack, but you cannot communicate using the normal communications else your presence and location will be detected by Darth Vader.

But you each possess an unlimited number of R2D2 messenger droids that you can use to send messages to each other. But, the droids may be destroyed by the enemy's PatrolBots, so you have no way of knowing if your message gets through unless Luke sends a droid back to you with a confirmation message.

Suppose your droid gets through to Luke and Luke sends a droid back to you with a confirmation message agreeing to the time to attack, but it is destroyed by a PatrolBot? Should he attack? You haven't received a confirmation, so what will you do?

Is there a protocol that you and Luke can use to avoid defeat? If not, explain why not. If there is a protocol that would work, please explain it.

Reference no: EM1368628

How each layer of the model represent the communication flow

Describe how each layer of the Model/Suite represents the communication flow between organizational levels and across departments/division of an actual hierarchical business

What limits the price from changing drastically in future

How has the cost of computers used in an office changed over the past 30 - 40 years? Which main component of the computer is driving this change? What has been the result of

Identify the drawbacks for using cloud computing in your bcp

Identify the drawbacks for using cloud computing in your BCP. Determine the strategies you would use to mitigate the drawbacks if you were the IT manager in charge of the de

Determine the topology that would you select

Suppose you had to implement either a full-mesh topology or start topology network on a university campus that has ten buildings. Determine the topology that would you selec

Create a new organisational unit in active directory

Create a new Organisational Unit (OU) in Active Directory called ‘test unit'. In the test unit OU, create a group policy with appropriate user account security (Group) polici

What is the correct subnet mask for the network

At one of your company's remote locations, you have decided to segment your class B address down, since the location has three buildings and each building contains no more t

Software development methodologies

Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. P

Compute udp checksum for internet department

Suppose that the receiver computes the UDP checksum for the Internet department received UDP and finds that matches the value transferred to the checksum field.


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd