Emulation, Computer Network Security

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose, the receiver will deliberately discard data packets (as if the packets are lost and not received) and the sender will deliberately discard ACKs before actually handling them. There are two ways to control the drop of the packets - deterministic and probabilistic. The deterministic way is to drop every nth packet, and the probabilistic way is to drop packets randomly with certain probability p. Which method will be used and the value of n or p will be passed in when starting the program.

The GBN node should be started with any of the following commands:

C $ ./gbnnode [ -d j -p ]

Java $ java gbnnode [ -d j -p ]

Python $ python gbnnode.py [ -d j -p ]

The user should only specify either -d or -p. The square bracket and the vertical line means to choose between the two options.

-d means the GBN node will drop packets (data or ACK) in a deterministic way (for every n packets), and -p

 

 

Posted Date: 2/20/2013 4:15:06 AM | Location : United States







Related Discussions:- Emulation, Assignment Help, Ask Question on Emulation, Get Answer, Expert's Help, Emulation Discussions

Write discussion on Emulation
Your posts are moderated
Related Questions
QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Need Assignemnt help in Information security assignemnt

IPV6 DATAGRAM FORMAT It is given in the figure below:

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Discuss the risks of having a single root user