Question

In: Computer Science

Assume both the TFTP sender and the TFTP receiver implement retransmit-on-timeout but not retransmit-on-duplicate. Outline a...

Assume both the TFTP sender and the TFTP receiver implement retransmit-on-timeout but not retransmit-on-duplicate. Outline a specific TFTP scenario in which the TFTP receiver of 16.4.2 TFTP States sets a socket timeout interval but never encounters a “hard” timeout – that is, a SocketTimeoutException – and yet must timeout and retransmit. Hint: arrange so the sender regularly times out and retransmits some packet, at an interval less than the receiver’s SocketTimeoutException time, but it is not the packet the receiver is waiting for

Solutions

Expert Solution

The TFTP specification is comparatively informal; newer protocols are often described using finite-state terminology. In each allowable state, such a specification spells out the suitable response to all or any packets. we will apply this approach to TFTP moreover.

Above we defined a DALLY state, for the receiver only, with a selected response to arriving Data[N] packets. There are two other important conceptual states for TFTP receivers, which we would call unlatched and established.

When the receiver-client first sends RRQ, it doesn't know the port number from which the sender will send packets. we'll call this state unlatched, because the receiver has not “latched on” to the proper port. during this state, the receiver waits until it receives a packet from the sender that appears sort of a Data[1] packet  that, it's from the sender’s IP address, it's a plausible length, it's a packet, and its block number is When the  packet is received, then receiver records the s_port, and after that it enters inthe established  state.

Once it comes in the established state, the receiver has to verify for all the packets that the source port number is s_port. If the  packet arrives from the another port, then the receiver sends back the packet to the  source an Error  packet with “Unknown Transfer ID”, but continues with the first transfer.


Related Solutions

Suppose both the sender and receiver are in the same local area network. If the sender...
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
Assume you are the sender in a hypothetical communication, what characteristics of the receiver, message, and...
Assume you are the sender in a hypothetical communication, what characteristics of the receiver, message, and level/type of noise would impact your decisions related to medium of the message. In what circumstances would you use written communication, oral communication, or both? Which of remaining three components (receiver, message, and noise) do is typically most important when you decide the specific medium (conversation, speech, phone call, video conference, letter, memo, email, etc.) you will use to communicate?
When encrypting data, we must ensure that both the sender and the receiver are in possession...
When encrypting data, we must ensure that both the sender and the receiver are in possession of the correct keys to allow them to either encrypt or decrypt the messages successfully. There are two main types of encryption defined by the number of different keys used. (10 marks total) i. Name each type and briefly explain how they are different? ii. Name one popular algorithm used for each type of encryption. iii. A user would like to send a long,...
Successful communication relies on a positive relationship between the sender of a message and the receiver....
Successful communication relies on a positive relationship between the sender of a message and the receiver. The response to your message depends on your credibility, which is based on how reliable you are and how much trust you evoke in others. Establishing credibility is a critical step in building business relationships. Respond to the following: Reflect on how you develop and maintain credibility in your workplace. Explain the importance of establishing credibility for business professionals. How does a poorly written...
A sender wants to transmit 16 frames in data link layer to a receiver, and every...
A sender wants to transmit 16 frames in data link layer to a receiver, and every 4th transmission is lost. How many total transmissions are required if A) Go-back-3 flow control is used? B) Selective repeat is used? C) Stop-and-wait is used?
Describe the most time-efficient way to implement the operations listed below. Assume no duplicate values and...
Describe the most time-efficient way to implement the operations listed below. Assume no duplicate values and that you can implement the operation as a member function of the class – with access to the underlying data structure. Then, give the tightest possible upper bound for the worst case running time for each operation in terms of N. Merging two binary min-heaps (both implemented using an array) each containing N elements into a single binary min heap. Explanation:
Explain various communication channels available between the sender and receiver? Further, elaborate how these communication channel...
Explain various communication channels available between the sender and receiver? Further, elaborate how these communication channel influence the message?
Have you or someone you know experienced negative results due to self-disclosure (as sender or receiver)?...
Have you or someone you know experienced negative results due to self-disclosure (as sender or receiver)? If so, what could have been altered in the decisions of what, where, when, or how to disclose that may have improved the situation?
1.What does Drucker mean when he suggests thatcommunication should be sender and receiver oriented?2.What...
1.What does Drucker mean when he suggests that communication should be sender and receiver oriented?2.What does Drucker mean when he suggests that Management as a social science is always changing?3.Why did business and non-profit leaders in the U.S. avoid using the word, 'management,' during the late 1920's and early 1930's? 
I need to implement a method that removes any duplicate items in a list and returns...
I need to implement a method that removes any duplicate items in a list and returns the new values    private static linkedlist removeDuplicates(linkedlist list) {    return list; }
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT