Specify protocol by listing the different messages

Assignment Help Computer Networking
Reference no: EM1355856

Q1) Suppose you wish to close a bank branch and introduce a teller machine. Your company has won the tender to develop an application-level protocol to be used between an automatic teller machine and a bank's centralized computer.
There are the following requirements that must be satisfied:

Your protocol should allow a user's card and password to be verified, the account balance (which is maintained at the centralized computer) to be queried, and an account withdrawal to be made.

Your protocol entities should be able to handle the all-too-common case in which there is not enough money in the account to cover the withdrawal.

Your tasks are as follows:

a. Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by providing the message structure.
Using a timing diagram provide a figure that shows the operation of your protocol for the case of a simple withdrawal with errors (i.e., insufficient balance).

Reference no: EM1355856

Questions Cloud

What is the marginal product of the second worker : What is the marginal product of the second worker and what is the marginal revenue product of the fourth worker?
Unrecognized gains and losses, corridor amortization : Rachel Avery, accounting clerk in the personnel office of Clarence G. Avery Corporation, has begun to calculate pension cost for 2004 but is not sure whether or not she should include the amortization of unrecognized gains or losses.
What will the induced emf in the short coil during this time : A cylindrical container with a cross-sectional area of 66.2 holds a fluid of density 816 kg/m3, and bottom of the container the pressure is 118 kPa. What is the depth of fluid.
Intermodal transportation with respect to global logistics : Explain how important is intermodal transportation with respect to global logistics? How do supply chains get more complicated when firms are doing business across borders versus domestically?
Specify protocol by listing the different messages : Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by providing the message structure.
Determine amount of cash received-prepare journal entries : Determine the amount of cash received and prepare the journal entries for (a) the Jan. 1 issuance and (b) the Dec. 31 recognition of interest.
Question related to global economy : Analyze the financial crises that have affected the global economy from 1997 until now. Do they all have a common origin? Explain your answer and give some examples.
Encountering a controversial issue : What does a counselor do when he or she encounters a controversial issue that goes against his or her ethics and values? Should he or she ignore those ethics? Or should he or she refer the client to another therapist?
Completion of accounting cycle : What are the steps in completing the accounting cycle? How do the different steps affect the financial statements?

Reviews

Write a Review

Computer Networking Questions & Answers

  Employment screening with organizations

Should the viewing or monitoring of social networking cites be considered an appropriate method for preliminary employment screening and continued employment with organizations?

  Explaining configuration of http and nntp in organization

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - Web, NNTP (Network News Transport Protocol). How do they figure into organizational security?

  Conduct a research on network address translation

Research network address translation (NAT). While conducting your research, consider purpose of NAT, compatibility with IPv6, and functions of automatic IP assignment and automatic name resolution.

  Identify need or opportunity that prompted decision

Locate two such organizations. For each of the two, identify the need or opportunity that prompted the decision to have a physical presence.

  Producing list of mac addresses and ip addresses

You have been asked in order to produce a list of the MAC addresses and the corresponding IP addresses and computer names within your network. Suggest at least two methods in order to complete this task.

  Information overload by changes to their technical system

Are organizations likely to find better solutions to information overload through changes to their technical systems or their social systems, or both? Why?

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Explaining sliding window protocol with the window size

Terminal A is sending data to terminal B using a sliding window protocol with the window size equal to 5 and the maximum sequence number equal to 6.

  Computing propagation delay of the link

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on earth. What is the propagation delay of the link?

  Advantages of current technologies virtual private networks

Write down the advantages of some of the current technologies including VoIP, Unified Communications, Virtual Private Networks.

  Pros and cons of routers and switches

Explain to your team the differences between routers and switches. Compare them and list the pros and cons of using each type of hardware.

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd