Questions tagged [protocols]
40 questions
57
votes
6 answers
Why are so many internet protocols text-based?
From what I have found, a very large amount of protocols that travel over the internet are "text-based" rather than binary. The protocols in question include, but are not limited to HTTP, SMTP, FTP (I think this one is all text-based?), WHOIS,…
IQAndreas
- 741
- 1
- 5
- 9
21
votes
4 answers
Measuring one way network latency
This is a puzzle about measuring network latency that I created. I believe the solution is that it's impossible, but friends disagree. I'm looking for convincing explanations either way. (Though it is posed as a puzzle I think it fits on this web…
Craig Gidney
- 5,992
- 1
- 26
- 51
13
votes
1 answer
Break an authentication protocol based on a pre-shared symmetric key
Consider the following protocol, meant to authenticate $A$ (Alice) to $B$ (Bob) and vice versa.
$$ \begin{align*}
A \to B: &\quad \text{“I'm Alice”}, R_A \\
B \to A: &\quad E(R_A, K) \\
A \to B: &\quad E(\langle R_A+1, P_A\rangle, K)…
Gilles 'SO- stop being evil'
- 44,159
- 8
- 120
- 184
8
votes
2 answers
Running an algorithm on data remotely and ensuring answer has not been tampered with
I´ve been thinking about this particular computing/crypto/database problem for years and I just want to know if there are already solutions to it. To be honest I don´t even know what field this problem belongs to exactly.
In a nutshell: person A has…
Robin A
- 81
- 4
5
votes
2 answers
Till which layer does the loopback packet goes?
I want to know exactly till which layer in the OSI model the 127.0.0.1 (loopback) packet goes till it is returned to the upper layer. I read some where it goes till data link layer. but as i was told data link layer cannot see the ip address then…
Ravi Singh
- 314
- 2
- 9
4
votes
1 answer
Break an authentication protocol based on a pre-shared symmetric key, with message numbers
Consider the following protocol, meant to authenticate $A$ (Alice) to $B$ (Bob) and vice versa.
$$ \begin{align*}
A \to B: &\quad \text{“I'm Alice”}, R_A \\
B \to A: &\quad E(\langle 1, R_A\rangle, K) \\
A \to B: &\quad E(\langle 2, R_A+1,…
Gilles 'SO- stop being evil'
- 44,159
- 8
- 120
- 184
3
votes
1 answer
The throughput of the ALOHA protocol if the Binomial distribution was used
In all the examples of ALOHA I've seen, the Poisson distribution is used. Theoretically, how could the throughput be calculated if a Binomial distribution was used instead?
For example, in the case that the offered load follows a Binomial…
tibsar
- 133
- 4
3
votes
1 answer
Randomized and Deterministic Communication Complexity of a function
I have a problem I'm trying to answer for my homework. The question is:
Let $p$ be a prime number and let $GF(p)$ denote the finite field of size $p$. Suppose that A has input $x∈GF(p)$ encoded with $⌈log2p⌉$ bits and B has input $y∈GF(p)$ encoded…
user45232
- 31
- 1
3
votes
1 answer
Explanation for the proof "Every 2-thread consensus protocol has a bivalent initial state"
From the book 'the art of multiprocessor programming':
A protocol state is bivalent if the decision value is not yet fixed:
there is some execution starting from that state in which the threads
decide 0, and one in which they decide 1.
Lemma…
Jover
- 31
- 3
3
votes
1 answer
Exercise: Sliding window protocol: Bits for sequence number
This is a task in a lecture on computer networks:
"Suppose you are designing a sliding window protocol for a 1-Mbps point-to-point link to the moon, which has a one-way latency of 1.25 seconds. Assuming that each frame carries 1 KB of data, what is…
KainMorgen
- 31
- 3
2
votes
0 answers
Importance of Needham–Schroeder Protocol
I'm working on a paper about model checking on cryptographic protocols and many of the papers I have read, base their approaches in the Needham-Schroeder protocol. I undestand this was one of the earliest security protocols for authentication and…
JMorales
- 21
- 1
2
votes
1 answer
Can Eve impersonate Alice or Bob by using a replay attack?
For my computer science study, I have to design a replay attack (if possible) for the following authentication protocols.
I use the standard security protocol notation.
In these protocols, $A$ is Alice, $B$ is Bob and $E(A)$ is for example Eve…
Peter
- 121
- 2
2
votes
1 answer
Sliding window protocol when number of packets is equivalent to the window size
I am currently taking a course in computer networking and I am curious about the following situation:
Given $n$ packets and a window size of $n$ (i.e., the number of packets is equivalent to the window size), what would happen in the following…
0kB
- 27
- 1
- 5
2
votes
2 answers
MESI Protocol Invalid cache line is attempted to be stored?
I am implementing a sample MESI simulator having two levels of cache (write back). I have added MESI status bits to both levels of cache. As it is a write back cache, the cache line is updated to L2 only when it is flushed. My doubts are
what…
User1234321232
- 131
- 6
2
votes
0 answers
Sending infinite frames in One-Bit Sliding WIndow Protocol?
I am reading Computer Networks by Andrew S. Tanenbaum and I wonder if there is a mistake in the protocol as I can't find any solution for the following scenario.
Suppose the transmitter (A) has only one frame (X) to send, and the receiver (B) has…
NimaJan
- 363
- 1
- 11