Define protocol, Computer Network Security

Assignment Help:

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte.

Your own packet header (not the UDP header) is needed to maintain the order of data packets. There will be no obligation on the format of headers, and you can design it in any way you like. For example, you can add a 32-bit sequence number ahead of the data you want to send.

The ACK packet is similar to the data packet except that it only has the header and does not have any data in it.

1925_sequence number.png

Figure: GBN Packet Header Example

 Buffer

Each node should have a sending buffer. All data packets (not ACK) should be put into the buffer before sending, and removed from the buffer once the corresponding ACK is received. The sending buffer should be long enough to avoid the conflict of packet numbers given the window size below. If the buffer is full, the sending function simply waits until more space is available.

 Window

The window moves along the sending buffer. If you implement the buffer as an array, the window should move back to the beginning of the array after reaching the end. Packets in the window should be sent out immediately. The size for the window will be passed in as an argument when starting your program.

 Timer

There is only one timer for GBN protocol. It starts after the first packet in the window is sent out, and stops when the ACK for the first packet in the window is received. After the window moves, if the first packet of the new window has already been sent out, the timer should simply restart, otherwise it should stop and wait for the first packet.

The timeout for the timer should be 500ms and all the packets in the window should be resent after timeout.


Related Discussions:- Define protocol

Evaluate the percentage availability of the network, QUESTION a) "Two ...

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Define multimedia and application of multimedia, Describe the salient featu...

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

Explain the usage of digital signature, a) Explain the contents of the Cost...

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

Future threats to network security and planning for those th, I need a help...

I need a help on how to write good assignment on the above topic

Provide a labelled drawing of a standard serial port, Question 1: (a) W...

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Categories of controls-risk management, Categories of Controls Controlli...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Innovative nature of triple key management, Innovative nature of triple key...

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

Computer security, For this assessment, students must research and analyse ...

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Explain the operation of the matchmaker middle agent, Question 1: (a) E...

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd