Hypothetical reliable data transfer protocol, Computer Network Security

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol:

In this protocol, a window of size W is used. The sender continuously sends W packets  corresponding to the current window, and then waits for an acknowledgement. The  receiver receives W packets. If all the packets are error-free, it sends out a positive  acknowledgement, say RR-i (RR: Receiver Ready). The receiver then moves its window starting from the packet with the sequence number i. Upon receiving RR-i the sender  moves its window starting from the packet with the sequence number i. If a receiver receives a damaged packet (say, with the sequence number j) in its current window, it receives and discards all the remaining packets in the current window and it sends out a negative acknowledgement, say REJ-j (REJ: Reject). The receiver then moves its window starting from the packet with the sequence number j. Upon receiving REJ-j the sender moves its window starting from the packet with the sequence number j and sends out packets starting from j.

Assume that the packet sequence number is in the range from 0 to 7. For each packet, 100 bytes of data is sent. Assume that a packet can be damaged according to a specified packet error probability. Ignore packet losses, ACK damages and losses. Implement the protocol, and measure and plot the throughput for different values of W (1, 2, 3, 4, and 5) and different error probabilities in the range from 0 to 0.5 in steps of 0.1. Use the random number generator to generate uniform distribution and declare a packet as damaged according to the specified error probability. Write a Report describing your implementation, how you carried out the performance study, performance graphs, and discussion on results.

Posted Date: 7/27/2013 6:41:39 AM | Location : United States







Related Discussions:- Hypothetical reliable data transfer protocol, Assignment Help, Ask Question on Hypothetical reliable data transfer protocol, Get Answer, Expert's Help, Hypothetical reliable data transfer protocol Discussions

Write discussion on Hypothetical reliable data transfer protocol
Your posts are moderated
Related Questions
SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

implementing password policy in organisation

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

what is relation ship between computer security goals?

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would