Design a reliable byte-stream protocol

Assignment Help Basic Computer Science
Reference no: EM131045868

You are hired to design a reliable byte-stream protocol that uses a sliding window (like TCP). This protocol will run over a 1-Gbps network. The RTT of the network is 140 ms, and the maximum segment lifetime is 60 seconds. How many bits would you include in the Advertised Window and Sequence Num fields of your protocol header?

Reference no: EM131045868

Questions Cloud

What is the maximum delay a packet might face : Suppose a router has accepted flows with the TSpecs shown in Table 6.6
Describe an application of epidemiology and give a current : Describe an application of epidemiology and give a current, real world example of it.
Journal entries to record the transactions of sage ltd : Required: Prepare the journal entries to record the transactions of Sage Ltd up to and including that which took place on 28 March 2016. Show all relevant dates, narrations and workings
Why would the receiver need an extra timer : Why would the receiver need an extra timer if it were responsible for reporting that its advertised window had become nonzero (i.e., if the sender did not probe)?
Design a reliable byte-stream protocol : The RTT of the network is 140 ms, and the maximum segment lifetime is 60 seconds. How many bits would you include in the Advertised Window and Sequence Num fields of your protocol header?
Local police department in order for department : 1. Suppose that a local government decides to provide more funds to the local police department in order for the department to hire additional police officers.  Is there an opportunity cost of this action?  If so, how would you ..
Full amount of the instrument with interest : $900.00 Smalltown, Illinois Maker, November 15, 2011 The undersigned promises to pay to the order of John Doe Nine Hundred Dollars with interest from date of note.
Explain the difficulty of doing this over a tcp connection : Suppose a host wants to establish the reliability of a link by sending packets and measuring the percentage that are received; routers, for example, do this.
What would happen if a later sent 200 bytes of data to b : Suppose the third party sends each end such a forged 100-byte data packet ostensibly from the other end. What happens now? What would happen if A later sent 200 bytes of data to B?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss some secure coding efforts and practices

Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet. Discuss some secure coding efforts and practices under way to mitigate the vulnerabilities exposed by this particular episode.

  What are the advantages of a web server

What are the advantages of a Web server?

  What specific olap operations should one performin order

A flight data warehouse for a travel agent consists of six dimensions: traveler, departure(city), departure time, arrival, arrival time, and flight; and two measures: count, andavg fare, where avg fare stores the concrete fare at the lowest level ..

  Write the truth table for a device

The output should be in Binary Coded Decimal representation. 4. Use Full Adders and logic gates to design a device which will multiply a given 4-bit signed input x by -2.

  Compare brands of virtualization software available

Compare and contrast the top three (3) brands of virtualization software available. Focus your efforts on components such as standard configuration, hardware requirements price, and associated costs.

  How to make the mail secure

How to make the mail secure As introduced in the proposal instruction, a proposal should include the following parts (more details see: https://people.ok.ubc.ca/rlawrenc/teaching/writingProposal.html):

  Generations of computer languages

Question 2 As discussed in class the computer memory can be divided in RAM and REM ,Question 3 URL stands for Universal Resource Locato.

  Describe how to use d

Suppose you have two nonempty stacks S and T and a deque D. Describe how to use D so that S stores all the elements of T below all of its original elements, with both sets of elements still in their original order.

  Implementation plan for word processing software application

Word processing software application. Boardman plans to hire Smith Systems Consulting to help them analyze their options and to create the implementation plan.

  Write a program that creates two vectors from x-one

write a program that creates two vectors from x-one (call it P) that contains the positive elements of x, and a second (call it N) that contains the negative elements of x. In both P and N, the elements are in the same order as in x.

  Developing edirectory products

What is your opinion of Reference Monitor? Some softwre vendors are developing eDirectory products, which essentially put all authentication and authorization functions in one central repository.

  Create a website that would allow users to enter

Create a Website that would allow users to enter and submit survey (to store in the database) and display survey results of total entered surveyed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd