What is the response of the machine to the given event

Assignment Help Computer Networking
Reference no: EM131894784

Problem

Answer the following questions related to the FSM's for the Selective-Repeat protocol with m = 7 bits (Figure 13.33):

a. The sending machine is in the ready state with Sf = 10 and Sn = 15. What is the sequence number of the next packet to send?

b. The sending machine is in the ready state with Sf = 10 and Sn = 15. The timer for packet 10 times out. How many packets are to be resent? What are their sequence numbers?

c. The sending machine is in the ready state with Sf = 10 and Sn = 15. An ACK with ackNo = 13 arrives. What are the next values of Sf and Sn? What is the action in response to this event?

d. The sending machine is in the blocking state with Sf = 14 and Sn = 21. What is the size of the window?

e. The sending machine is in the blocking state with Sf = 14 and Sn = 21. An ACK with ackNo = 14 arrives. Packets 15 and 16 have been already acknowledged. What are the next values of Sf and Sn? What is the state of the sending machine?

f. The receiving machine is in the ready state with Rn = 16. The size of the window is 8. A packet with sequence number 16 arrives. What is the next value of Rn? What is the response of the machine to this event?

g. The receiving machine is in the ready state with Rn = 16. The size of the window is 8. A packet with sequence number 18 arrives. What is the next value of Rn? What is the response of the machine to this event?

h. The receiving machine is in the ready state with Rn = 16. The size of the window is 8. A packet with sequence number 18 arrives. What is the next value of Rn? What is the response of the machine to this event?

Reference no: EM131894784

Questions Cloud

Study human resource management : Why do you think it is necessary to study human resource management? How are people a competitive advantage to an organization?
Show the bidirectional fsms for the go-back-n protocol : Show the bidirectional FSMs for the Go-back-N protocol using piggybacking. Note that both parties need to send and receive.
Focus upon accounting data : The "balanced scorecard" concept has proven disappointing because in practice it tends to focus upon accounting data.
How are training and development similar in nature : What is a specific example of how training and/or development can be used to create more productive and/or engaged employees in the workplace?
What is the response of the machine to the given event : The size of the window is 8. A packet with sequence number 18 arrives. What is the next value of Rn? What is the response of the machine to this event?
How do differences in international hr management : How do differences in international HR management (IHRM) strategies affect the relative importance of each of the HR domains?
Discuss the workforce diversity : HRMD 651 Of the trends (e.g. technology, workforce diversity, big data, mobile learning, etc.), which two or three do you think will influence.
How important are laws to protect the prosperity of business : How important are laws to protect the prosperity of businesses? How important are laws to protect society from the (perhaps unintended) costs of business?
How many packets are to be resent : The sending machine is in the ready state with Sf = 10 and Sn = 15. A time-out occurs. How many packets are to be resent? What are their sequence numbers?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd