Emulation, Computer Network Security

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose, the receiver will deliberately discard data packets (as if the packets are lost and not received) and the sender will deliberately discard ACKs before actually handling them. There are two ways to control the drop of the packets - deterministic and probabilistic. The deterministic way is to drop every nth packet, and the probabilistic way is to drop packets randomly with certain probability p. Which method will be used and the value of n or p will be passed in when starting the program.

The GBN node should be started with any of the following commands:

C $ ./gbnnode [ -d j -p ]

Java $ java gbnnode [ -d j -p ]

Python $ python gbnnode.py [ -d j -p ]

The user should only specify either -d or -p. The square bracket and the vertical line means to choose between the two options.

-d means the GBN node will drop packets (data or ACK) in a deterministic way (for every n packets), and -p

 

 

Posted Date: 2/20/2013 4:15:06 AM | Location : United States







Related Discussions:- Emulation, Assignment Help, Ask Question on Emulation, Get Answer, Expert's Help, Emulation Discussions

Write discussion on Emulation
Your posts are moderated
Related Questions
QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f


ROUTING TABLES AND ADDRESS MASKS Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address m

on LAN,where are IP datagrams transported?

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

briefly expslain type of e-commerce

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?