Implementing sliding window protocols using cnet

Assignment Help Computer Networking
Reference no: EM13732964

Question: Implementation of sliding window protocol on a 6 node network. Specifications are given in the attached file.

Modules 1: Implementing Sliding Window Protocols using CNET

In this module, you are required to implement the "Sliding Window" protocol on a 6- node network. The topology of the network is given in Figure 1.

1060_Implementing Sliding Window Protocols using CNET.png

It is assumed that the nodes will communicate directly with each other if they are directly connected, otherwise the intermediate nodes will be used to relay the communications. No dynamic routing is required.

Please study the "stopandwait" sample files provided carefully, and build your work based on it. Your implementation should provide a mechanism for the nodes to address one another, and a service for the application layer to send message to a given destination address. Feel free to set the sizes of the sliding windows in each node as you wish and it is fine if you set them all to be the same. However please note that you need to demonstrate the cases when the window is exhausted, so do not set the window size to be too big. In the display window of every node, it is required to display the source and destination of each frame (which can be either a data or acknowledgement frame), while the sequence number are required on every data/acknowledgement frames.

Please note that you are NOT required to position the 6 nodes in geographically correct positions, i.e. we are interested in topology, NOT topography.

Write a short document (no more than 5 pages single space) describing your implementation of the "Sliding Window" protocol on the 6-node network. You need to describe the organization of your source code, and your implementations on some design issues such as sending, receiving, and re-transmission.

Verified Expert

This report is discussed about the sliding window protocol and go back n ARQ protocol. The go back n protocol implemented for given network topology in cnet simulation tool. All implementation functions are included in this report and it contains 1000 words. The solution contains output screen shot of sliding window protocol implementation in CNET tool.

Reference no: EM13732964

Questions Cloud

Environmental factors and organizational process assets : The most important inputs for Risk Management Planning include: Environmental factors, organizational process assets, scope statement, and project management plan.
Role of ethics and social responsibility : Explain the role of ethics and social responsibility in developing a strategic plan while considering stakeholder needs and agendas.
Write an essay on the progressive movement : The History of Reconstruction, The Industrial Revolution, The Progressive Movement, America's Age of Imperialism, Final Paper Preparation, Women's Rights and Final Paper Preparation, Native Americans.
What is process modeling : What is Process modeling? What is data-flow diagram? Why do systems analysts use DFD
Implementing sliding window protocols using cnet : Implementing Sliding Window Protocols using CNET - It is assumed that the nodes will communicate directly with each other if they are directly connected, otherwise the intermediate nodes will be used to relay the communications. No dynamic routing ..
The four strategic choices for mnes : Which of the following is NOT one of the four strategic choices for MNEs
Purchasing the brand products : What are 2 demographic and 2 psychographic characteristics of the customer who you think would be interested in purchasing the brand's products?
What were the main causes of the reign of terror : What were the main causes of the ‘Reign of Terror? Write a one paragraph obituary for someone who died during the Reign of Terror. Be creative!
Choose a topic in health care : As your final task (Key Assignment), you will choose a topic in health care (e.g. cardiovascular issues, obesity, or cancer) and analyze it. Then, integrate all of the steps and standards that are needed to meet the quality improvement and perform..

Reviews

Write a Review

Computer Networking Questions & Answers

  Part 1 of 1 - 1 question 1 of 16let npq where pq are primes

part 1 of 1 - 1 question 1 of 16let npq where pq are primes of the same length and let phi be eulers totient

  Describe how to configure a switch and router in a 350- to

describe how to configure a switch and router in a 350- to 750-word paper in apa format. be sure to include the

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

  In her paper developing an effective metrics program

in her paper developing an effective metrics program rosenberg described a group of sample goals questions and metrics.

  How many transactions could the server process

How many transactions/second could the server process if it had 2 threads?

  Maximum size of file-tcp sequence numbers are not exhausted

Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

  Find out which scripting language is supported by web server

As web developers, we must find out which scripting language is supported by the web server to understand what kind of rights and privileges we must take into account.

  Find ip address of your computer

Find IP Address of your computer(My IP Address: 192.168.1.5) - What is the length (#bytes) of the IP Address?

  You are the leader of a small group of engineers who were

you are the leader of a small group of engineers who were issued a request for proposal rfp for the implementation of

  Superior medical equipment company supplies electrical

superior medical equipment company supplies electrical equipment that is used as components in the assembly of mri cat

  What is the ethernet standard used in such a vlan

Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet and write a report on your observations analyzing the data collected in previous step.

  Which layer of tcp/ip reference model contains information

Which layer of TCP/IP reference model contains the information on source port number and destination port number? Why do we need the source and destination port numbers when we already have source and destination IP addresses?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd