Define protocol, Computer Network Security

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte.

Your own packet header (not the UDP header) is needed to maintain the order of data packets. There will be no obligation on the format of headers, and you can design it in any way you like. For example, you can add a 32-bit sequence number ahead of the data you want to send.

The ACK packet is similar to the data packet except that it only has the header and does not have any data in it.

1925_sequence number.png

Figure: GBN Packet Header Example

 Buffer

Each node should have a sending buffer. All data packets (not ACK) should be put into the buffer before sending, and removed from the buffer once the corresponding ACK is received. The sending buffer should be long enough to avoid the conflict of packet numbers given the window size below. If the buffer is full, the sending function simply waits until more space is available.

 Window

The window moves along the sending buffer. If you implement the buffer as an array, the window should move back to the beginning of the array after reaching the end. Packets in the window should be sent out immediately. The size for the window will be passed in as an argument when starting your program.

 Timer

There is only one timer for GBN protocol. It starts after the first packet in the window is sent out, and stops when the ACK for the first packet in the window is received. After the window moves, if the first packet of the new window has already been sent out, the timer should simply restart, otherwise it should stop and wait for the first packet.

The timeout for the timer should be 500ms and all the packets in the window should be resent after timeout.

Posted Date: 2/20/2013 4:13:15 AM | Location : United States







Related Discussions:- Define protocol, Assignment Help, Ask Question on Define protocol, Get Answer, Expert's Help, Define protocol Discussions

Write discussion on Define protocol
Your posts are moderated
Related Questions
Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer