Question regarding the flooding for a network

Assignment Help Basic Computer Science
Reference no: EM131038966

Write a program in a programming language of your choice to simulate routing using flooding for a network of your choice with at least ten nodes (different from the example in the lecture notes). Each packet should contain a counter that is decremented on each hop. When the counter gets to zero, the packet is discarded. Time is discrete, and each line can handle only one packet per time interval. Discuss your results in terms of the number of duplicate packets produced, and suggest a possible solution for reducing this problem. You will be marked based on the following:

  • Well written report with clear explanation of the program.
  • Description of the flooding algorithm and the network used.
  • Well structured working code.
  • Presentation of your results.
  • Discussion of your results.
  • Solution for reducing the problem of duplicate packets.

Reference no: EM131038966

Questions Cloud

What is the unit conversion cost for may : What is the unit conversion cost for May? (Round unit costs to 2 decimal places, e.g. 2.25.) The unit conversion cost for May $
Create a supplier performance improvement plan : Create a supplier performance improvement plan. Include the steps that need to be taken to identify the root cause, potential containment, and corrective action. You need to include how you will monitor compliance to corrective action and if the c..
Ending inventory using the average periodic method : The following information comes from CROW Inc.'s inventory records: Purchase date Units Cost per unit Sale date Units sold Beginning inventory 40 $12 Jan 2 150 $10 Jan 10 125 Jan 12 100 $8 Jan 15 100 Jan 20 100 $5 Jan 31 50 Required: Determine End..
Make a preliminary disaster management plan : Create a security plan that includes authentication and authorization with appropriate general policies and procedures. Consider the use of roles, stored procedures, views, and other tools.
Question regarding the flooding for a network : Write a program in a programming language of your choice to simulate routing using flooding for a network of your choice with at least ten nodes (different from the example in the lecture notes).
What will be the break-even point in terms of sales dollars : If the sales mix is changed to 60,000 units of the school model and 20,000 units of the hiker model, what will be the break-even point in terms of sales dollars?
Company declared and paid dividends : On December 31, 2016, Ditka Inc. had Retained Earnings of $269,800 before its closing entries were prepared and posted. During 2016, the company had service revenue of $170,100 and interest revenue of $82,300. The company used supplies in the amou..
Types of wireless attacks : Create a spreadsheet using MS Excel or another spreadsheet software that lists the types of wireless attacks, how they are carried out, and what is the best way to guard against them.
Importance of standards in networking technology : Discuss the importance of standards in networking technology and in communications in general. Evaluate how standards have helped to shape commonly used devices such as cellular phones or mobile devices.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify the practice you feel is most useful for it auditor

List at least three best practices of being an IT auditor. Identify the practice you feel is most useful for an IT auditor and explain why

  Determines how the agent would use the system trigger

This example use case determines how the Agent would use the system Trigger: Relationships: Normal Flow of events: Subflows: None Alternate / Exceptional Flows:

  How to convert 8 bit binary to decimal, such as 01111111

How to convert 8 bit binary to decimal, such as 01111111?

  Show in steps how quicksort algorithm

Show in steps how Quicksort Algorithm works to sort the following array... 7   5    4   8   6   3   5    9

  Find levels resulting tree have if key compression is used

How many levels would resulting tree have if key compression is used and it decreases the average size of each key in the entry to 10 bytes?

  Write the definition of a class player containing

Write the definition of a class Player containing: An instance variable name of type String , initialized to the empty String. An instance variable score of type int , initialized to zero.

  What is one method to enter the project start date

What is one method to enter the project start date. Not the start date of a task (that's a different question, below) not even of the first task but the start date of the entire project. Describe AND provide a screen shot of the steps.

  What are penalties for committing these crimes

What might the profile be for a cybercriminal who commits this type of cybercrime?

  Paper is a proposal for leonard cooper charter school

Paper is a proposal for Leonard Cooper Charter School for improving their network. The stakeholders of the system are facing a number of problems, especially since a new addition to the building was added. This proposal addresses each of the stakehol..

  The two main forms of documentation

The two main forms of documentation of program design are flowcharts and pseudcode. Based on this week's text chapter and some relevant web resources, discuss the differences between flowcharts and pseudocode, as well as their merits and faults.

  C code

C code to find the sum of elements

  Common network for all onboard systems

What benefits are derived from the using a common network for all onboard systems. Comment on the security concern.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd