Network protocol hierarchy , Computer Network Security

Assignment Help:

This assignment aims to enhance students' understanding of the network protocol hierarchy and flow control and error control techniques by implementing a sliding window protocol in a simulated communication network system. The programming language will be Java.

The simulated communication system consists of the following two major components:

1. Network Simulator This component simulates the physical transmission media which connects two communicating virtual machines. The component may be set to operate in one of the four different quality levels of service: o Level 0: an error-free transmission media.

o Level 1: a transmission media which may lose frames.

o Level 2: a transmission media which may damage frames (i.e., generating checksum-errors).

o Level 3: a transmission media which may lose and damage frames.

2. Virtual Machine This component simulates a communicating virtual machine. Internally, it is divided into two sub-components:

(1) Sliding Window Protocol This component implements the sliding window protocol (i.e., the data link layer). In this simulated system, this component cannot work alone, and must interact with the Sliding Window Environment component (to be described next) in order to fetch/deliver a sequence of packets from/to the upper network layer, and to fetch/deliver a sequence of frames from/to the lower physical layer.

(2) Sliding Window Environment This component provides the environment in which the sliding window protocol component is working. Basically, this component implements the following major interfaces: o The interface between the data link layer and the network layer. This interface consists of three procedures:

1. to_network_layer(), to deliver a packet to the network layer.

2. from_network_layer(), to fetch a packet from the network layer.

3. enable_network_layer(int creditnr), to grant the number of creditnr credits to the network layer so that the network layer can generate the number of creditnr new packets.

In addition, this component implements the capability of automatically sending/receiving a sequence of packets to/from the data link layer.

o The interface between the data link layer and the physical layer. This interface consists of two procedures:

1. to_physical_layer(), to deliver a frame to the physical layer.

2. from_physical_layer(), to fetch a frame from the physical layer.

In addition, this component is responsible for interacting with the Network Simulator to transmit/receive frames to/from the underlying transmission media.

o The interface between the data link layer and the underlying event queue. This interface consists of the following procedures:

1. wait_for_event(): to wait for the arrival of an event.

2. generate_acktimeout_event(): to generate an acknowledgement timeout event.

3. generate_timeout_event(int seqnr): to generate a timeout event for an outstanding frame with the sequence number seqnr. Note: When a timeout event is being handled by the sliding window protocol, the protocol variable oldest_frame will be automatically set to the sequence number corresponding to the current timeout event.

It should be pointed out that the Network Simulator component is running in one process, and the Virtual Machine component (including both the Sliding Window Protocol and the Sliding Window Environment) is running in another process. To simulate the communication between two virtual machines, two Virtual Machine processes must be executed.


Related Discussions:- Network protocol hierarchy

Threat identification-risk management, Threat Identification After ident...

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

What is meant by certificate revocation, QUESTION (a) Which PKI (Public...

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

What is triple key management scheme, Q. What is Triple Key Management Sche...

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Address resolution with closed-form computation, ADDRESS RESOLUTION WITH CL...

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

TCP/ ip, Q1 (15 marks, 5 marks each part): This question has three parts: ...

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Miss, You are an IT Security administrator in a banking organization. Your ...

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

Explain the dimension of service quality, Problem 1: Discuss how TWO of...

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

Ethernet network, QUESTION : a) A datagram of 3000 bytes has to travel...

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd