The protocols tag has no usage guidance.
11
votes
2answers
683 views
Why are so many internet protocols text-based?
From what I have found, a very large amount of protocols that travel over the internet are "text-based" rather than binary. The protocols in question include, but are not limited to HTTP, SMTP, FTP (I ...
1
vote
1answer
30 views
Till which layer does the loopback packet goes?
I want to know exactly till which layer the 127.0.0.1 (loopback) packet goes till it is returned to the upper layer. I read some where it goes till data link layer. but as i was told data link layer ...
0
votes
0answers
26 views
Efficiency of a stop and wait protocol , please check whether my answer is correct?
Problem is
Suppose that the stop-and-wait protocol is used on a link with a bit rate of 64 kilobits per second and 20 milliseconds propagation delay. Assume that the transmission time for the ...
1
vote
1answer
36 views
Sliding window protocol when number of packets is equivalent to the window size
I am currently taking a course in computer networking and I am curious about the following situation:
Given $n$ packets and a window size of $n$ (i.e., the number of packets is equivalent to the ...
0
votes
0answers
13 views
What is a Buffer Insertion Ring network?
In some scientific papers I've been reading, Buffer Insertion Rings have been mentioned. Yet a Google Search on the topic turns up nothing useful that can help me quickly understand what it is.
Can ...
0
votes
1answer
51 views
Can parallel downloading with many ip's possible?
I am not too intelligent,but i got this in my mind.Lets say i download a file from abc.com
and the speed is limited for an IP(say 60kbps).Can i initiate parallel downloads from multiple ip addresses ...
1
vote
0answers
54 views
computational and messages complexity equivalence between STP and Leader election
I'm doing a presentation for a distributed systems and networks course.
I'm using the book "Design and Analysis of Distributed Algorithms", written by Nicola Santoro. This book contains the proof of ...
0
votes
1answer
45 views
How can one come up with reasonable IP subnet allocations?
An ISP has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20
The ISP wants to give half of this chunk addresses to Organization A,
and ...
0
votes
1answer
125 views
Owned state in MOESI protocol-transitions?
I understand that MESI is a subset of the MOESI cache coherency protocol. But what does the Owned state in the MOESI protocol represent? What are the differences in state transition due to the extra ...
2
votes
1answer
127 views
MESI Protocol Invalid cache line is attempted to be stored?
I am implementing a sample MESI simulator having two levels of cache (write back). I have added MESI status bits to both levels of cache. As it is a write back cache, the cache line is updated to L2 ...
1
vote
0answers
37 views
Is this protocol suitable for transaction services?
The paper Eventually-Serializable Data Services (PODC'96) presented an eventually-serializable data service.
In the abstract, it says:
… and generalizes their algorithm (in the related work Lazy ...
14
votes
3answers
1k views
Measuring one way network latency
This is a puzzle about measuring network latency that I created. I believe the solution is that it's impossible, but friends disagree. I'm looking for convincing explanations either way. (Though it is ...
3
votes
1answer
107 views
Break an authentication protocol based on a pre-shared symmetric key, with message numbers
Consider the following protocol, meant to authenticate $A$ (Alice) to $B$ (Bob) and vice versa.
$$ \begin{align*}
A \to B: &\quad \text{“I'm Alice”}, R_A \\
B \to A: &\quad E(\langle ...
9
votes
1answer
250 views
Break an authentication protocol based on a pre-shared symmetric key
Consider the following protocol, meant to authenticate $A$ (Alice) to $B$ (Bob) and vice versa.
$$ \begin{align*}
A \to B: &\quad \text{“I'm Alice”}, R_A \\
B \to A: &\quad E(R_A, K) ...