Emulation, Computer Network Security

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose, the receiver will deliberately discard data packets (as if the packets are lost and not received) and the sender will deliberately discard ACKs before actually handling them. There are two ways to control the drop of the packets - deterministic and probabilistic. The deterministic way is to drop every nth packet, and the probabilistic way is to drop packets randomly with certain probability p. Which method will be used and the value of n or p will be passed in when starting the program.

The GBN node should be started with any of the following commands:

C $ ./gbnnode [ -d j -p ]

Java $ java gbnnode [ -d j -p ]

Python $ python gbnnode.py [ -d j -p ]

The user should only specify either -d or -p. The square bracket and the vertical line means to choose between the two options.

-d means the GBN node will drop packets (data or ACK) in a deterministic way (for every n packets), and -p

 

 

Posted Date: 2/20/2013 4:15:06 AM | Location : United States







Related Discussions:- Emulation, Assignment Help, Ask Question on Emulation, Get Answer, Expert's Help, Emulation Discussions

Write discussion on Emulation
Your posts are moderated
Related Questions
TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou