What will happen if the sender uses longer time

Assignment Help Computer Engineering
Reference no: EM132153428

The Trivial File Transfer Protocol (TFTP, RFC 1350) is an application layer protocol that uses the Stop-and-Wait protocol. To transfer a file from a server to a client, the server breaks the file into blocks of 512 bytes and sends these blocks to the client using Stop-and-Wait ARQ.

Assume that the transmission time of one block is 2ms, and that of an acknowledgment is 2ms. Assume also that the sender uses a timeout value of 5ms.

Show the pattern of transmissions and associated state transitions for the following sequence of events: the server transmits 5 blocks If your student ID is EVEN, hen the 2^nd block is lost and the acknowledgment of the 4^th block (not counting any resubmission) is lost. If your student ID is ODD, then the 1st block is lost, and the acknowledgment of the 3rd block (not counting any resubmission) is lost.

Draw the flow control in the chart provided in the following page.

Describe in details how the sender and the receiver will behave. Your graphs must show the sliding windows, the sequence number of the frames, and any special action performed by the sender of the receiver (e.g., Discard the frame, initiate a timer, time outs ...) as we have shown in the slides.

What will happen if the sender uses longer time out duration, let say 8ms?

Reference no: EM132153428

Questions Cloud

What is the maximum number of values a tree of depth : A tree structure is designed for a specific application where a single node holds until it gets to 5 data elements.
Why would someone shop on the internet : Why would someone shop on the Internet? Buy an iPod? Eat at TGI Friday's frequently? Why would someone else not make those purchases?
What is the expected return using the capm model : Using the stocks in your initial portfolio, prepare a valuation of each stock and the initial portfolio using zero, constant or variable growth models.
Discuss about the traveling salesman fact check : Generally the travelisng salesman problem is best represented through the use of graphs but not always.
What will happen if the sender uses longer time : Describe in details how the sender and the receiver will behave. Your graphs must show the sliding windows, the sequence number of the frames.
Identify the strengths and weaknesses of each rating : In your own words and using various bond websites, please locate one of each of the following bond ratings: AAA, BBB, CCC, and D.
Write a program that prints out the even numbers : Write a program in C++ that prints out the even numbers between 1 and 21 using WHILE loop.
Discuss the nature of the problem : Discuss the "nature" of the problem, so that NHG management is informed and can effectively evaluate the proposal that MAD provides.
Discuss the different shapes of trees : Tree Shapes Discussion Forum. Discuss the different shapes of trees.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Creating a secure messaging app from scratch

Creating a secure messaging app from scratch using all the principles learned from the mistakes of current products by emphasizing security.

  Show the schematic diagram of memory system

In each of the designs in Problem, show the physical location of the following addresses: 0, 48, 356, and 8192.

  Write a program segment for an interactive program

Write a program segment for an interactive program to input values for a person's age, height, weight, and first name. Assume that the person using the program.

  How many conductors will be required

If an address bus needs to be able to address eight devices, how many conductors will be required? What if each of those devices also needs to be able to talk back to the I/O control device?

  What is the most important aspect of the web

To begin discussing in this forum, click the PC Chat Forum title below, which navigates to the discussion forum. Then, click Reply at the end of each message.

  The most common process to ensure client security

How can worms and viruses be introduced to a Web site. What is the most common process to ensure client security.

  Discuss factors that affect international operations at ups

Describe the external factors that affect the international operations at UPS

  What would be some of the risks associated

In your role as a project manager at an IT company, you are tasked with shortening the critical path of the project and saving money. Is this possible?

  How to support multiple incoming requests via threads

The email database server is designed to accept multiple incoming requests via a socket in order to locate a specific message and return it to the client email browser (such as Outlook Express).

  How does an attack differ from a security risk

How does an attack differ from a security risk? What is authentication and how does it differ from authorization? Why would there a need for remote data access?

  Relationship between hardware and software

What are the relationship between hardware and software.

  Estimating the performance of processor

Without any hardware support, context switch time is not zero. This states that the actual performance will not be as good as the ideal above.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd