Which protocol is used to avoid defeat

Assignment Help Computer Networking
Reference no: EM1368628

You and Luke Sky Walker are commanders in the rebel army preparing to attack Darth Vader and his Death Star. By yourselves, neither you nor Luke possesses enough fire power to defeat Darth Vader, but together you can destroy the Death Star. However, you must come to agreement on the precise moment to attack, but you cannot communicate using the normal communications else your presence and location will be detected by Darth Vader.

But you each possess an unlimited number of R2D2 messenger droids that you can use to send messages to each other. But, the droids may be destroyed by the enemy's PatrolBots, so you have no way of knowing if your message gets through unless Luke sends a droid back to you with a confirmation message.

Suppose your droid gets through to Luke and Luke sends a droid back to you with a confirmation message agreeing to the time to attack, but it is destroyed by a PatrolBot? Should he attack? You haven't received a confirmation, so what will you do?

Is there a protocol that you and Luke can use to avoid defeat? If not, explain why not. If there is a protocol that would work, please explain it.

Reference no: EM1368628

Questions Cloud

Explain the purpose of opec : What is the economic purpose of OPEC including the definitions and differences of a monopoly, an oligopoly, and a cartel as a briefing to an economic consulting firm.
Explain sam now thinks the place looks great : Explain Sam now thinks the place looks great and has decided not to sell and A business law student told him he could do this. Can he?
Discuss the components of gross national product : Discuss the components of Gross National Product? How does it understate aggregate production in Third World countries where substantial economic production may be consumed directly
Explain demonstrate this through the development of at least : Explain Demonstrate this through the development of at least four reasons to include the expected benefits and challenges.
Which protocol is used to avoid defeat : You and Luke Sky Walker are commanders in rebel army preparing to attack Darth Vader and his Death Star. Is there protocol which you and Luke can use to avoid defeat? If not, describe why not.
Show the consumer expectations : Consumer expectations - Compare and contrast Ford and Toyota and discuss how and why one organization kept pace
Calculate the payback period for an asset : Calculate the payback period for an asset that has a first cost of $40,000, a salvage value of $8000 anytime within ten-years of its purchase, and generates income of $6000 per year.
Explain what impact might your recommendation have on eurest : Explain What impact might your recommendation have on Eurest's employees, customers, and business and government partners
Value of server farms-virtualization to large organization : Describe at lease 750 words(in your own words) what is meant by "server farm" and by "virtualization". What is the value of server farms and virtualization to large organization?

Reviews

Write a Review

Computer Networking Questions & Answers

  Researching web browsers

Research three web browsers. For each browser, try to use it to at least access, if not actively work with, each of the following type of common web sites.

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Advantages of current technologies virtual private networks

Write down the advantages of some of the current technologies including VoIP, Unified Communications, Virtual Private Networks.

  How to assign ip addresses to various subnets

Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets?

  Describe physical layer standard to access method

Describe its physical layer standard this access method should rely on. What types of infrastructure upgrades are necessary to implement your suggested network?

  Conduct a research on network address translation

Research network address translation (NAT). While conducting your research, consider purpose of NAT, compatibility with IPv6, and functions of automatic IP assignment and automatic name resolution.

  How many registers available for use by input parameters

Each register window has 32 registers, of which 10 are global variables and 10 are local variables. How many registers would be available for use by input parameters?

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  Vpn access for employees to remotely access

Explain best option for VPN access for employees to remotely access the Ocper, Inc. network and describe your reasoning.

  Advantages and disadvantages of connection method

Prepare a three-column table (one column for each technology) in which you list the advantages and disadvantages of each connection method.

  Explain client-server architecture

Explain client/server architecture, including fat and thin clients, middleware and client/server tiers. Make use of Visio to prepare architecture diagrams that enhance your explanation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd