Questions tagged [communication-protocols]
101 questions
57
votes
6 answers
Why are so many internet protocols text-based?
From what I have found, a very large amount of protocols that travel over the internet are "text-based" rather than binary. The protocols in question include, but are not limited to HTTP, SMTP, FTP (I think this one is all text-based?), WHOIS,…
IQAndreas
- 741
- 1
- 5
- 9
29
votes
7 answers
If the two generals problem is unsolvable how can we human beings agree on things?
If the two generals problem is unsolvable how can we human beings agree on things?
I mean, we communicate everyday and have the same limitations as any communication problem handled by computer science. Why doesn't it affect us?
user1508072
- 475
- 5
- 4
12
votes
1 answer
TCP Connection Termination - FIN, FIN ACK, ACK
I've been reading that to terminate a TCP connection 3 handshakes are required: FIN, FIN ACK, and ACK. However, when closing a connection, Wireshark displays FIN ACK, FIN ACK, ACK; it never displays FIN by itself.
However, when establishing a…
Jack
- 175
- 2
- 2
- 8
6
votes
1 answer
Could a standardized ternary system be more efficient than the binary system?
Could a standardized ternary (base-3) system be more efficient than the binary (base-2) system? Binary is efficient for processing using logic gates, but can be bulky when using for file storage or file transfer. I am interested in the feasibility…
JaceVoracek
- 63
- 4
6
votes
4 answers
Link utilization of sliding window protocol
Before I ask my doubt I would like to state that problem which led me to my doubt. It can also serve as a good example scenario.
A $20\ Kbps$ satellite link has a propagation delay of $400\ ms$. The transmitter employs the "Sliding Window protocol"…
Prateek
- 476
- 1
- 3
- 13
6
votes
3 answers
Difference between CRC and Hamming Code
I am a bit confused on the difference between Cyclic Redundancy Check and Hamming Code. Both add a check value attached based on the some arithmetic operation of the bits in the message being transmitted. For Hamming, it can be either odd or even…
user40759
6
votes
2 answers
Algorithm for Dynamic Client Side Throttling
Problem
I am trying to come up with an algorithm that will dynamically throttle a client's number of outstanding requests based on the response times of completed requests. Response times are unpredictable and can be between 7 and 90 seconds. The…
Animal Style
- 111
- 1
- 8
5
votes
0 answers
How to ensure connectedness in a masterless gossip protocol?
This is a theoretical question about how gossip protocols work; I am not asking about any specific implementation or piece of software.
I've read the wikipedia page https://en.wikipedia.org/wiki/Gossip_protocol on gossip protocols, and the idea…
Richard Rast
- 151
- 5
5
votes
2 answers
Why is the throughput (performance) of the Slotted Aloha protocol ≈ 0.36
I've read that the throughput - that is, the amount of good useful messages relative to capacity - of the Slotted ALOHA protocol for communication networks is roughly 0.36%.
But its not clear how we arrived at that number.
Can someone explain it?
CodyBugstein
- 3,017
- 11
- 31
- 46
5
votes
3 answers
Why is it seemingly easier to resume torrent downloads than browser downloads?
I really wonder how torrent downloads can be resumed at later point of time.
If such a technology exists, then why is it not possible in browsers?
It is often not possible to pause a browser download so that it can be resumed at a later point of…
Sachin Jain
- 161
- 4
4
votes
1 answer
Compute the union of two sets between two endpoints minimizing communication complexity
I have two endpoints, $a$ and $b$, that can communicate through a channel. $a$ is storing a set of fixed-length strings $A = \{a_1, \ldots, a_{N_A}\}$, and $b$ is storing another set of fixed-length strings $B = \{b_1, \ldots, b_{N_B}\}$, with in…
Matteo Monti
- 205
- 1
- 4
4
votes
1 answer
What is a "name/variable of base type" in applied $\pi$-calculus?
I'm studying the articleVerifying privacy-type properties of
electronic voting protocols which uses Applied $\pi$-calculus to formalize voting protocols and verifies some privacy-related properties.
In certain parts of the paper they define some…
Bakuriu
- 807
- 7
- 19
4
votes
2 answers
Does a collision occur if two packets are sent at the same time in Slotted AHOLA?
There's something I don't really understand about the Slotted AHOLA protocol, and I hope you can help me: what happens if a station wants to send two packets at the same time? Will it be considered as a collision? If not, when will the first and…
user29882
- 41
- 1
4
votes
2 answers
Byzantine generals problem with signed messages (Lamport)
I have some trouble understanding Lamport's paper about the Byzantine generals problem when it comes to signed messages. He showed that, with signed messages, the number of generals must be at least $m+2$ to tolerate $m$ malicious units\faults (for…
Matthias Preu
- 141
- 3
4
votes
0 answers
totally ordered multicast with Lamport timestamp
I'm studying Distributed Systems and synchronization and I didn't catch this solution of totally ordered multicast with Lamport timestamps. I read that it doesn't need ack to deliver a message to the application, but
"It is sufficient to multicast…
Fabrizio
- 61
- 1
- 5