Outline the design of a scheme that uses message retransmissions with IP multicast to overcome the problem of dropped messages. Your scheme should take the following points into account:

i) there may be multiple senders;
ii) generally only a small proportion of messages are dropped;
iii) unlike the request-reply protocol, recipients may not necessarily send a message within any particular time limit.
Assume that messages that are not dropped arrive in sender ordering.


To allow for point (i) senders must attach a sequence number to each message. Recipients record last sequence number from each sender and check sequence numbers on each message received.
For point (ii) a negative acknowledgement scheme is preferred (recipient requests missing messages, rather than acknowledging all messages). When they notice a missing message, they send a message to the sender to ask for it. To make this work, the sender must store all recently sent messages for retransmission. The sender re-transmits the messages as a unicast datagram.
Point (iii) - refers to the fact that we can’t rely on a reply as an acknowledgement. Without acknowledgements, the sender will be left holding all sent messages in its store indefinitely. Possible solutions: a) senders discards stored messages after a time limit b) occasional acknowledgements from recipients which may be piggy backed on messages that are sent.
Note requests for missing messages and acknowledgments are simple - they just contain the sequence numbers of a range of lost messages.

Computer Science & Information Technology

You might also like to view...

To capture an image, a camera's lens focuses light onto a small image sensor called a charge-coupled device.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.?

A. DNS overflow? B. ?Teardrop C. ?Land D. ?Chargen

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The contents of memory on a running system will change for no apparent reason while the system is sitting there doing nothing. 2. A DoD approved disk wiping utility works by instructing the hard disk controller to apply a strong magnetic field to the disk surface, thereby electronically erasing the information from the disk. 3. Once a file has been deleted from the Recycle Bin in Windows 7, it is no longer salvagable under any circumstances. 4. Changing a file's extension in Windows makes the file completely unreadable by the operating system. 5. Even after a file is emptied from the Recycle Bin, there remains an entry for that file in the MFT. 6. A general rule of thumb regarding file headers is that a humanly readable file has a humanly readable header.

Computer Science & Information Technology

Which of the following is NOT a typical action of the catch block?

A. Completely handling the exception B. Partially processing of the exception C. Rethrowing the same exception for the calling environment D. Throwing the exception

Computer Science & Information Technology