Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
In a two-phase, total-order multicast system, messages are sent in the following sequence from
node S to G1 and G2. G1 and G2 are the members of the group.
S sends m1 to G1
S sends m1 to G2
S sends m2 to G2
S sends m2 to G1
Use the basic implementation of the Lamport clock. The clock s at each node start at: S: 4, G1: 6, G2: 1.
Show the exchange of messages and their acknowledgments in a clock diagram using the basic implementation of Lamport's clock.
In which order and at what times are m1 and m2 delivered?
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
Knowledge Booster
Similar questions
- In a token ring network: A Each node has to 'grab' the token at a designated time and send or receive a message B Messages can be passed round the ring in either direction C Message tokens can simultaneously be passed around the ring D The message is passed to the correct recipient by a central computerarrow_forwardDistance vector routing is used. Router L receives distance vectors from routers I, H, and K as shown below.(image) The distance from L to I is 30, from L to H is 10, and from L to K is 9. Show L’s updated routing table based on the vectors.arrow_forwardSuppose we have switches S1 through S4; the forwarding-table destinations are the switches themselves. The tables for S2 and S3 are as below, where the next_hop value is specified in neighbor form: S2: ⟨S1,S1⟩ ⟨S3,S3⟩ ⟨S4,S3⟩ S3: ⟨S1,S2⟩ ⟨S2,S2⟩ ⟨S4,S4⟩ From the above we can conclude that S2 must be directly connected to both S1 and S3 as its table lists them as next_hops; similarly, S3 must be directly connected to S2 and S4. (a). The given tables are consistent with the network diagrammed in exercise 6.0. Are the tables also consistent with a network in which S1 and S4 are not directly connected? If so, give such a network; if not, explain why S1 and S4 must be connected. (b). Now suppose S3’s table is changed to the following. Find a network layout consistent with these tables in which S1 and S4 are not directly connected. Do not add additional switches. S3: ⟨S1,S4⟩ ⟨S2,S2⟩ ⟨S4,S4⟩ While the table for S4 is not given, you may assume that forwarding does work correctly.…arrow_forward
- - Consider an ARQ protocol that uses only negative acknowledgments (NAKS), but no positive acknowledgments (ACKS). Describe what timeouts would have to be scheduled. Explain why an ACK-based protocol is usually preferred to a NAK-based protocol.arrow_forwardplease please answer asaparrow_forwardAll packets are treated equally in Priority Queuing. Select one: O True O Falsearrow_forward
- Complete the following protocol message so that it represents a potentiometer reading of 987: (write values in hex, with the leading 0x) Ox21 Ox33 Ox03 Oxdbarrow_forward1. If the values of user tool frame UT[2] is (0, 0, 0, 0, 0, 0) in the robot system, then UT[2] (a) is not activated in the robot system (b) cannot be used in recording robot point P[n] (c) coincides with default TCP frame (Def-TCP) of the robot in the robot system (d) coincides with robot world frame R in the robot system 2. A frame transformation is given as 4T; = (X,Y,Z,W,P, R) = (0,0,0, –90, 0, 90). The corresponding graphical representation of the given frame transformation is (a) (b) y yarrow_forwardComputer A uses the Go-back-N ARQ protocol to send a 110 Mbytes file to computer B with a window size of 15. Given each frame carries 100K bytes data. How long does it take to send the whole file (the total time taken from A sending the first bit of the file until A receiving the last acknowledgment)? Given that the transmission rate of the link is 500 Mbps and the propagation time between A and B is 15ms. Assume no data or control frame is lost or damaged and ignore the overhead due to header and trailer.arrow_forward
- In the congestion control method of TCP we are having a connection between nodes A and node B which is called connection X. There is another TCP connection between node C and node D which is called connection Y. The initial threshold window size for connection X is 20 KB and for Y is 16 KB. Both the connections X, Y are working independently and follow the Additive increase multiplicative decrease algorithm (AIMD) for congestion control with a maximum segment size of 2 KB. The first timeout occurs at the fifth transmission in connection X and at the sixth transmission in connection Y. After every third transmission from timeout, you again encounter the timeout in both X and Y. At which transmission the connection Y reaches to the same threshold value of the connection X for the first time.arrow_forward4. In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted and all adapters are synchronized to the slots. Unlike slotted ALOHA, however, the length of a slot (in seconds) is much less than a frame time (the time to transmit a frame). Let S be the length of a slot. Suppose all frames are ofarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY