Emulation, Computer Network Security

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose, the receiver will deliberately discard data packets (as if the packets are lost and not received) and the sender will deliberately discard ACKs before actually handling them. There are two ways to control the drop of the packets - deterministic and probabilistic. The deterministic way is to drop every nth packet, and the probabilistic way is to drop packets randomly with certain probability p. Which method will be used and the value of n or p will be passed in when starting the program.

The GBN node should be started with any of the following commands:

C $ ./gbnnode [ -d j -p ]

Java $ java gbnnode [ -d j -p ]

Python $ python gbnnode.py [ -d j -p ]

The user should only specify either -d or -p. The square bracket and the vertical line means to choose between the two options.

-d means the GBN node will drop packets (data or ACK) in a deterministic way (for every n packets), and -p

 

 

Posted Date: 2/20/2013 4:15:06 AM | Location : United States







Related Discussions:- Emulation, Assignment Help, Ask Question on Emulation, Get Answer, Expert's Help, Emulation Discussions

Write discussion on Emulation
Your posts are moderated
Related Questions
Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted