Explaining protocol to avoid defeat

Assignment Help Computer Networking
Reference no: EM1347726

Q1) You and Luke Sky Walker are commanders in the rebel army preparing to attack Darth Vader and his Death Star. By yourselves, neither you nor Luke possesses enough fire power to defeat Darth Vader, but together you can destroy the Death Star. However, you must come to agreement on the precise moment to attack, but you cannot communicate using the normal communications else your presence and location will be detected by Darth Vader.

But you each possess an unlimited number of R2D2 messenger droids that you can use to send messages to each other. But, the droids may be destroyed by the enemy's PatrolBots, so you have no way of knowing if your message gets through unless Luke sends a droid back to you with a confirmation message.

Suppose your droid gets through to Luke and Luke sends a droid back to you with a confirmation message agreeing to the time to attack, but it is destroyed by a PatrolBot? Should he attack? You haven't received a confirmation, so what will you do?

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

Reference no: EM1347726

Questions Cloud

How to draw free-body diagrams of blocks : A new General Electric kitchen stove has a mass of 68kg and the dimensions. The stove comes with a warning that it can tip forward if the person stands or sits on oven door when it is open.
Feature set of free helix forensics cd : Visit Helix web site and read about feature set of free Helix forensics CD. Note that documentation for Helix is not on CD, to keep it down to ~700MB.
Problem on bar expansion : Two sound speakers separated by a distance of 3-meters, are driven in phase by same audio amplifier. A listener sits directly in front of one speaker at a distance of 4 meters from it so that listener and speakers form a right triangle.
Direct material variances : This question is on variance analysis in managerial or cost accounting. More specifically, it asks for computations of direct material price variance, direct material efficiency or usage variance, the flexible budget variance, and determining whet..
Explaining protocol to avoid defeat : Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.
Collaboration process to achieve organizational goals : Discuss and explain the steps of collaboration procedure among the functional areas that must be employed to achieve organizational objectives.
Illustrate what expect would happen to coffee consumption : Illustrate what do you expect would happen to coffee consumption? In what direction would the CPI move, ceteris paribus? Would that change correctly reflect the impact on consumers' welfare? Explain briefly.
Prepare variance analysis report : Strauss Table Company manufactures tables for schools. The 20x4 operating budget is based upon sales of 20,000 units at $ 100 per table.
Calculate investors percentage holding period return : A shareholder bought ten Ellis Industries, long-term bonds one year ago, when they were 1st issued by the firm. Next Time, he bought 200 shares of the firm's common stock at the same time for $30 per share.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd