Define protocol, Computer Network Security

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte.

Your own packet header (not the UDP header) is needed to maintain the order of data packets. There will be no obligation on the format of headers, and you can design it in any way you like. For example, you can add a 32-bit sequence number ahead of the data you want to send.

The ACK packet is similar to the data packet except that it only has the header and does not have any data in it.

1925_sequence number.png

Figure: GBN Packet Header Example


Each node should have a sending buffer. All data packets (not ACK) should be put into the buffer before sending, and removed from the buffer once the corresponding ACK is received. The sending buffer should be long enough to avoid the conflict of packet numbers given the window size below. If the buffer is full, the sending function simply waits until more space is available.


The window moves along the sending buffer. If you implement the buffer as an array, the window should move back to the beginning of the array after reaching the end. Packets in the window should be sent out immediately. The size for the window will be passed in as an argument when starting your program.


There is only one timer for GBN protocol. It starts after the first packet in the window is sent out, and stops when the ACK for the first packet in the window is received. After the window moves, if the first packet of the new window has already been sent out, the timer should simply restart, otherwise it should stop and wait for the first packet.

The timeout for the timer should be 500ms and all the packets in the window should be resent after timeout.

Posted Date: 2/20/2013 4:13:15 AM | Location : United States

Related Discussions:- Define protocol, Assignment Help, Ask Question on Define protocol, Get Answer, Expert's Help, Define protocol Discussions

Write discussion on Define protocol
Your posts are moderated
Related Questions
Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach