Answers to the exercise #3 on Computer Networks - Christian
a user's card and password to be verified, the account balance (which is main- tained at the bank) to be queried, and an account withdrawal to be made. (money ...
Answers to the exercise #3 on Computer Networks Christian Rinderknecht 11 April 2008
Question. Design a protocol to be used between an automatic teller machine (ATM) and a bank’s centralised computer. Your protocol should allow a user’s card and password to be verified, the account balance (which is maintained at the bank) to be queried, and an account withdrawal to be made (money is given to the customer). 1. Specify your protocol by listing the messages exchanged and the action taken by the ATM or the bank’s centralised computer on transmission or receipt of each message: From ATM to Bank Message name and arguments
Meaning/Action
From Bank to ATM Message name and arguments
Meaning/Action
1
2. Sketch the operation of your protocol, using a diagram, for the cases of a simple withdrawal (a) with no errors, (b) with one error. Answer. One example is as follows. Messages from ATM to server: Message name HELO
PASSWD BALANCE WITHDRAWAL BYE
Purpose Let server know that there is a card in the ATM, then transmits user ID to server User enters PIN, which is sent to server User requests balance User asks to withdraw money User all done
Messages from server to ATM (display): Message name Purpose PASSWD Ask user for PIN (password) OK Last requested operation (PASSWD, WITHDRAWAL) OK Last requested operation ERR (PASSWD, WITHDRAWAL) resulted in error AMOUNT Sent in response to BALANCE request User done, display welcome BYE screen at ATM A correct withdrawal looks like this: HELO PASSWD BALANCE WITHDRAWAL ATM dispenses money BYE
Apr 18, 2008 - Answer the following questions, briefly jus- tifying your answer. (a) Would a packet-switched network or a circuit-switched network be more ...
Oct 24, 2008 - Suppose a client uses a non-persistent connection to query a page made of a base html file and ten jpeg images, all objects being stored on ...
Answers to the mid-term exam on Prolog. Christian Rinderknecht. 19 October 2006. 1 Matching. Question. Show the results (Yes/No) and resulting variable ...
Answers to the Final Exam on. Prolog Programming. Christian Rinderknecht. 3 December 2008. 1 Sorting leaves in a binary tree. Question. Design a simple ...
... does not contain X. Since the heads of rules 2 and 4 match a non empty S, X must only match [] in the new rule 5, which can then be further simplified as ...
Answers to the final exam on Algebraic. Specification. Christian Rinderknecht. 17 June 2005. 1 Binary tree specification. Let us recall an algebraic specification ...
Oct 12, 1998 - Principles of application layer protocols ... success after several days (often 5 days), the server removes the .... 3 Jul 01 15:17:39 GMT.
Answers to quiz #1 on Algebraic Specification. Christian Rinderknecht. 17 May 2005. 1 Arrays. We want an algebraic specification of arrays. An array is a list ...
video-conference) because of its variable and unpredictable delays. (mainly queuing ... The advantage of message segmentation with packet switching is that.
Network access and physical media. ⢠ISPs and Internet backbones. ⢠Delay and loss in packet-switched networks. ⢠Protocol layers and their service models.
A single name server would have to handle all the dns queries. (from http requests and e-mails at hundreds of millions of hosts). ⢠A single name server cannot ...
Millions of people subscribe to free webbased e-mail services such as Hotmail ... gateway, employees downloading attachments from web-based accounts ... Advanced tools automate these and other functions, freeing IT to do other projects. ..... This wh
Answers to the quiz on Compilers. Christian Rinderknecht. 29 November 2005. Question. Consider the following Lex regular expression and propose a transi-.
Answers to the final examination of Erlang. Christian Rinderknecht. 14 June 2007. 1 Merging sorted lists. Question. Write a function merge/2 which takes two lists ...
Oct 4, 2005 - know exactly their names for the C language, we still can find meaningful names based on what ... The method to answer these questions is simply to try small words by constructing ... Let us test the membership with x = aba:.
My Technical Solution. Main Choices. .... ends the referee brings back the paper to the committee. ... the program does the ranking and select fencers for the.
What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of these layers? 2. What information is used by a process ...
Mar 2, 2007 - The purpose of this exercise is to let you familiar with socket programming in C. Write a file transfer application that runs over UDP. Assume the ...
Mar 30, 2007 - background and waits for service requests from a standard email client (e.g. Outlook, ... forward its email message to the SMTP relay server.
May 15, 2007 - Q1 â The TCP in station A sends a SYN segment with ISN = 1000 and MSS = 1000 to station B. Station B replies with a SYN segment with ISN ...
22 juin 2016 - without being limited to, the cost of the labour, materials and services required to complete this work, including the supply of information, tests ...
Apr 24, 2007 - (a) Provide a formula for the total delay, that is, the queuing delay plus the transmission delay. (b) Express the total delay as a function d of L/R, ...
What are the advantages of message segmentation in packet-switched ... are variable? ... Five generic tasks are error control, flow control, segmentation and.