Explaining protocol to avoid defeat

Assignment Help Computer Networking
Reference no: EM1347726

Q1) You and Luke Sky Walker are commanders in the rebel army preparing to attack Darth Vader and his Death Star. By yourselves, neither you nor Luke possesses enough fire power to defeat Darth Vader, but together you can destroy the Death Star. However, you must come to agreement on the precise moment to attack, but you cannot communicate using the normal communications else your presence and location will be detected by Darth Vader.

But you each possess an unlimited number of R2D2 messenger droids that you can use to send messages to each other. But, the droids may be destroyed by the enemy's PatrolBots, so you have no way of knowing if your message gets through unless Luke sends a droid back to you with a confirmation message.

Suppose your droid gets through to Luke and Luke sends a droid back to you with a confirmation message agreeing to the time to attack, but it is destroyed by a PatrolBot? Should he attack? You haven't received a confirmation, so what will you do?

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

Reference no: EM1347726

Questions Cloud

How to draw free-body diagrams of blocks : A new General Electric kitchen stove has a mass of 68kg and the dimensions. The stove comes with a warning that it can tip forward if the person stands or sits on oven door when it is open.
Feature set of free helix forensics cd : Visit Helix web site and read about feature set of free Helix forensics CD. Note that documentation for Helix is not on CD, to keep it down to ~700MB.
Problem on bar expansion : Two sound speakers separated by a distance of 3-meters, are driven in phase by same audio amplifier. A listener sits directly in front of one speaker at a distance of 4 meters from it so that listener and speakers form a right triangle.
Direct material variances : This question is on variance analysis in managerial or cost accounting. More specifically, it asks for computations of direct material price variance, direct material efficiency or usage variance, the flexible budget variance, and determining whet..
Explaining protocol to avoid defeat : Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.
Collaboration process to achieve organizational goals : Discuss and explain the steps of collaboration procedure among the functional areas that must be employed to achieve organizational objectives.
Illustrate what expect would happen to coffee consumption : Illustrate what do you expect would happen to coffee consumption? In what direction would the CPI move, ceteris paribus? Would that change correctly reflect the impact on consumers' welfare? Explain briefly.
Prepare variance analysis report : Strauss Table Company manufactures tables for schools. The 20x4 operating budget is based upon sales of 20,000 units at $ 100 per table.
Calculate investors percentage holding period return : A shareholder bought ten Ellis Industries, long-term bonds one year ago, when they were 1st issued by the firm. Next Time, he bought 200 shares of the firm's common stock at the same time for $30 per share.

Reviews

Write a Review

Computer Networking Questions & Answers

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  Explaining bus collision avoidance protocol

Some network designers used alternative bus collision avoidance protocol known as the token bus protocol.

  Wide area network by using frame relay technology

Site networks are connected to form wide area network using frame relay technology. Webservers located at each site provide access to information resources.

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Ways to stop interference from arc welders

Provided that both the design shop and front office utilizes areas? What medium guarantees immunity from the interference?

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Selecting the network

She has bids from several companies in order to install (1) Wi-Fi, or (2) a switched Ethernet 100 Base T network. She wishes you to provide her some sense of relative performance of the alternatives so that it may be related to the costs of each o..

  Several network connections in the operation

By using a laptop computer along with a wireless connection into company’s local area network, you download a Web page from Internet. State all several network connections involved within this operation.

  Describing status of 3g and 4g network technologies

Describe in scholarly detail status of 3G and 4G network technologies and even challenge yourself to find out any research on future of 5G technology.

  Employment screening with organizations

Should the viewing or monitoring of social networking cites be considered an appropriate method for preliminary employment screening and continued employment with organizations?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd