联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp

您当前位置:首页 >> Python编程Python编程

日期:2025-04-01 10:29

CSCI 4211: Introduction to Computer Networks

Spring 2025

PROGRAMMING PROJECT 2: Reliable Data Transfer

Due: Phase 1 - Mar 18

th

, Phase 2 - Mar 28

th

, 2024 at 11:59 p.m.

Notes:

● The description of this project is a bit long to provide you with as many details as

possible to help you get through it. Please spend some time reading it all the

way through and make sure you have a full understanding of it before you start

programming.

● The use of generative AI is strictly prohibited for this project.

1. Overview...................................................................................................................... 2

2. Project Details............................................................................................................. 3

2.1 Phase Overview.................................................................................................... 3

2.2 Phase 1: The Stop-and-Wait Protocol................................................................... 3

2.2.1 Finite State Machines................................................................................... 3

2.2.2 High-Level Description.................................................................................. 5

2.2.3 Helpful Hints..................................................................................................6

2.2.4 Expected Output........................................................................................... 7

2.2.4.1 Zero Loss and Corruption Probabilities................................................ 7

2.2.4.2 Non-Zero Loss and/or Corruption Probabilities.................................... 7

2.3 Phase 2: The Go-Back-N Protocol........................................................................ 9

2.3.1 Finite State Machines................................................................................... 9

2.3.2 High-Level Description................................................................................ 10

2.3.3 Helpful Hints................................................................................................12

2.3.4 Expected Output......................................................................................... 13

2.3.4.1 Zero Loss and Corruption Probabilities.............................................. 13

2.3.4.2 Non-Zero Loss and/or Corruption Probabilities.................................. 14

2.3.5 Extra Credit................................................................................................. 15

2.3.5.1 Part 1: Buffered Application Layer Messages [10 points]...................15

2.3.5.2 Part 2: Buffered Out-Of-Order Packets [5 points]............................... 16

2.4 Provided Starter Files.......................................................................................... 16

2.4.1 Skeleton Code............................................................................................ 16

2.4.2 Software Interfaces..................................................................................... 17

2.4.3 The Simulated Network Environment......................................................... 19

2.5 Testing and Evaluation........................................................................................ 20

1

2.5.1 Stop-and-Wait............................................................................................. 21

2.5.2 Go-Back-N.................................................................................................. 21

3. Additional Help......................................................................................................... 22

3.1 Helpful Resources............................................................................................... 22

3.2 General Advice.................................................................................................... 22

4. Submission Information...........................................................................................23

4.1 Grade Breakdown............................................................................................... 23

4.2 General Grading Criteria..................................................................................... 23

4.2.1 Program Specifications / Correctness.........................................................23

4.2.2 Readability.................................................................................................. 23

4.2.3 Documentation............................................................................................ 24

4.2.4 Code Efficiency........................................................................................... 24

4.2.5 Assignment Specifications.......................................................................... 25

4.3 Gradescope Autograder Details.......................................................................... 25

4.4 What To Submit................................................................................................... 25

4.4.1 Phase 1....................................................................................................... 26

4.4.2 Phase 2....................................................................................................... 26

4.5 Common Error Checks........................................................................................ 26

1. Overview

The goal of this project is to help you get familiar with reliable data transfer (RDT)

protocols. You will implement rdt3.0 (Alternating-Bit-Protocol or Stop-and-Wait) and

Go-Back-N, which were discussed in the lectures and textbook.

In this project, you will write the sending and receiving transport-level code for

implementing an RDT protocol. This project should be fun since your implementation

will differ very little from what would be required in a real-world situation.

Since you probably don’t have standalone machines (with an OS that you can modify),

your code will have to be executed in a simulated hardware/software environment.

However, the programming interface provided to your routines, i.e., the code that would

call your entities from above and below, is very close to what is done in an actual UNIX

environment. Indeed, the software interfaces described in this project are much more

realistic than the infinite loop Senders and Receivers that many texts describe. The

starting/stopping of timers is also simulated, and timer-interrupts will cause your

timer-handling routine to execute.

2

2. Project Details

2.1 Phase Overview

The project is divided into two phases, with a deadline and deliverable for each phase.

Here is the overview of each phase:

2.2 Phase 1: The Stop-and-Wait Protocol

2.2.1 Finite State Machines

Your starting point to implement each protocol is understanding the relevant finite state

machines (FSMs) for the Sender and the Receiver. Each FSM explains:

1. The possible states each Sender/Receiver can have [what is written inside each

circle]

2. The events that can happen at each state [conditions written above the horizontal

line]

3. The actions taken in response to each event [actions written below the horizontal

line]

Since the Stop-and-Wait finite state machines have multiple states, you need to use a

variable to indicate the current state and update it when a transition in the FSM is made.

Also, ensure that your code handles each event and takes the appropriate

corresponding actions.

3

Refer to the lectures and/or Section 3.4.1 of the textbook for a detailed explanation of

the FSMs for Stop-and-Wait (rdt3.0). The receiver side of rdt3.0 is the same as rdt2.2.

Figure 3.15: Stop-and-Wait rdt3.0 Sender.

Figure 3.14: Stop-and-Wait rdt2.2 Receiver (and rdt3.0 as well).

4

2.2.2 High-Level Description

Implement the following routines in the source code and any other helper functions you

design to support the RDT from the Sender to the Receiver (only one direction) with a

simulated lossy and noisy channel. These are the routines you are required to

implement:

● Sender (SNW_Sender.py):

○ The initialization of the Sender includes its initial sequence number, states,

etc. Feel free to define any other relevant variables that you think are

necessary.

The state can be WAIT_LAYER5 or WAIT_ACK:

■ WAIT_LAYER5: The Sender waits for a message from the

application layer (layer 5). The Sender can only send new packets

when it’s in this state. This is the same as the "Wait for call <#>

from above" states in the Sender FSM.

■ WAIT_ACK: The Sender waits for an ACK from the Receiver. When

the Sender is in this state, it can’t send a new packet even if it

receives a new message from the application layer. This is the

same as the "Wait for ACK<#>" states in the Sender FSM.

The sequence number is either 0 or 1, and it alternates based on the

sequence number used in the last packet sent.

○ S_output(message), where message is an instance of type msg and

contains data to be sent to the Receiver: This routine will be called

whenever the Sender’s application layer has a message to send. It is the

job of your protocol implementation to ensure that the data in this

message is delivered in order and correctly to the Receiver’s application

layer.

○ S_input(packet), where packet is an instance of type packet: This routine

will be called whenever a (possibly corrupted) ACK packet sent by the

Receiver (i.e., as a result of the to_layer_three() function being called by

the Receiver) arrives at the Sender. This is the same as the "Wait for call

<#> from below" states in the Receiver FSM.

5

○ S_handle_timer(): This routine will be called when the Sender’s timer

expires (thus generating a timer interrupt). You should use this routine to

control the retransmission of packets. See the provided description of

start_timer() and stop_timer() below in Section 2.4.2 to understand

how the timer should be started and stopped.

○ S_lost_packet(): This routine will be called by the simulator when a data

packet that was sent by the Sender was lost in the network. You must

update the appropriate counter (see Section 2.5) and can add print

statements in this function for debugging purposes.

● Receiver (SNW_Receiver.py):

○ The initialization of the Receiver includes the first expected sequence

number, states, etc. Feel free to define any other relevant variables that

you think are necessary.

○ R_input(packet), where packet is an instance of type packet: This routine

will be called whenever a (possibly corrupted) data packet sent by the

Sender (i.e., as a result of the to_layer_three() function being called by

the Sender) arrives at the Receiver.

○ R_lost_packet(): This routine will be called by the simulator when an

ACK packet that was sent by the Receiver was lost in the network. You

must update the appropriate counter (see Section 2.5) and can add print

statements in this function for debugging purposes.

2.2.3 Helpful Hints

● How to handle timers:

○ The Sender only needs one timer and will start and stop it when needed.

Once the Sender sends any data packet, it will start the timer. When the

timer expires, the Sender will retransmit the last unacknowledged packet

and start a new timer. The Receiver does not need to handle any timer, it

just needs to acknowledge the recently received correct data.

○ You do not need to stop the timer when you are in S_handle_timer(), as

it has already expired and been removed from the event list with the call of

S_handle_timer().

6

2.2.4 Expected Output

All of the following output was generated by sending 5 messages (i.e., nsimmax = 5).

2.2.4.1 Zero Loss and Corruption Probabilities

In the general test case without loss or corruption in the network, your output (excluding

the statistics section) should look like the following example. The output shows that all

of the messages are received correctly.

2.2.4.2 Non-Zero Loss and/or Corruption Probabilities

When the loss and/or corruption probabilities are set to a non-zero value, your output

should show corrupted and/or lost packets, packets with wrong sequence or

acknowledgement numbers, timeouts, etc. An example of such output (excluding the

statistics section) is shown below. The output shows that all of the messages are

eventually received correctly.

Note: Do not expect your output to be identical due to the non-deterministic behavior of

the simulation when it’s configured with non-zero loss and corruption probabilities.

7

8

2.3 Phase 2: The Go-Back-N Protocol

2.3.1 Finite State Machines

FSM details for Go-Back-N are in Section 3.4.3 of the textbook. You can also use this

interactive animation as a reference.

Figure 3.20: Extended FSM description for the Go-Back-N Sender.

Figure 3.21: Extended FSM description for the Go-Back-N Receiver.

9

2.3.2 High-Level Description

Implement the following routines in the source code and any other helper functions you

design to support the RDT from the Sender to the Receiver (only one direction) with a

simulated lossy and noisy channel. These are the routines you are required to

implement:

● Sender (GBN_Sender.py):

○ The initialization of the Sender includes its initial sequence number, states,

etc. Feel free to define any other relevant variables that you think are

necessary. The Sender must implement a window/buffer to hold packets

that are in transit and specify its size (e.g., a size of 8).

As you know from Lecture 10, you need to choose the maximum

sequence number properly based on the relationship between the window

size and the sequence number. This is necessary to avoid any confusion

by the Receiver when determining whether the received packet is either

new or a duplicate. Hence, if you have a window of size N, then the set of

possible sequence numbers should have N + 1 values and rotate between

1, 2, ..., N, N + 1, and then restart again from 1.

○ S_output(message), where message is an instance of type msg and

contains data to be sent to the Receiver: This routine will be called

whenever the Sender’s application layer has a message to send. It is the

job of your protocol implementations to ensure that the data in this

message is delivered in order and correctly to the Receiver’s application

layer.

This routine will sometimes be called when there are outstanding,

unacknowledged messages in the network -- implying that you must buffer

multiple messages in the Sender. Also, sometimes your Sender will be

called, but it won’t be able to send the new message because the new

message falls outside of the window. Since the Sender’s buffer has a

maximum number of slots available, which can be equal to the window

size (e.g., 8), the Sender will simply drop this new message should all 8

slots be in use at one point waiting for their ACK. In the “real world,” of

course, one would have to develop a more elegant solution to the finite

buffer problem!

10

Note: You are REQUIRED to implement a window/buffer. If you do not

implement it, then the behavior will be identical to Stop-and-Wait, and you

will lose points. The Sender should only be able to send new packets up

to the window size and move the window up when it receives an ACK to

allow space for sending more packets. For example, if the Sender has a

window size of 8, and it has sent 6 packets that are still unacknowledged,

then it can afford to send 2 new packets. However, if its window is FULL,

then it can’t send new packets, and its subsequent actions will depend on

your implementation. If you decide not to implement the extra credit part

about buffering new messages (see Section 2.3.5.1), then simply drop the

new message.

○ S_input(packet), where packet is an instance of type packet: This routine

will be called whenever a (possibly corrupted) ACK packet sent by the

Receiver (i.e., as a result of the to_layer_three() function being called by

the Receiver) arrives at the Sender.

○ S_handle_timer(): This routine will be called when the Sender’s timer

expires (thus generating a timer interrupt). You should use this routine to

control the retransmission of packets. See the provided description of

start_timer() and stop_timer() below in Section 2.4.2 to understand

how the timer should be started and stopped.

You do not need a timer for each packet in the window, only one timer is

enough. However, there may be many outstanding, unacknowledged

packets in the network, so you'll have to think about how to use this single

timer effectively (see Section 2.3.3).

● S_lost_packet(): This routine will be called by the simulator when a data

packet that was sent by the Sender was lost in the network. You must

update the appropriate counter (see Section 2.5) and can add print

statements in this function for debugging purposes.

● Receiver (GBN_Receiver.py):

○ The initialization of the Receiver includes the first expected sequence

number, states, etc. Feel free to define any other relevant variables that

you think are necessary.

11

○ R_input(packet), where packet is an instance of type packet: This routine

will be called whenever a (possibly corrupted) data packet sent by the

Sender (i.e., as a result of the to_layer_three() function being called by

the Sender) arrives at the Receiver.

○ R_lost_packet(): This routine will be called by the simulator when an

ACK packet that was sent by the Receiver was lost in the network. You

must update the appropriate counter (see Section 2.5) and can add print

statements in this function for debugging purposes.

2.3.3 Helpful Hints

● How to handle timers:

○ The Sender in Figure 3.20 from the textbook uses only a single timer,

which can be thought of as a timer for the oldest transmitted but not yet

acknowledged packet. If an ACK is received and there are still additional

transmitted but not yet acknowledged packets, then the timer should be

restarted. If there are no outstanding, unacknowledged packets afterward,

then the timer is just stopped. The basic reason behind this is that if the

ACKs are being delivered, then the Sender will restart the timer for the

current packets still in the window until their ACK arrives without

retransmitting them. They will only be retransmitted when the timer

expires.

● Circular buffer: A circular_buffer class has been provided to support the

buffer requirements for the Go-Back-N Sender.

● Cumulative ACK:

○ What to do with out-of-order packets is up to your implementation. The

simulator will not change the order of the packets, but when the Sender

sends some packets through the network up to N (window size), some of

them could be corrupted or lost, and later ones could arrive without any

issues.

○ If the Receiver does not buffer the out-of-order packets, then it will wait for

all packets to be retransmitted. If the Receiver buffers the correctly

received packets, then after the retransmission of the corrupted and lost

packets, it can use a cumulative ACK to acknowledge the ones it already

has stored in its buffer. The Sender won’t need to resend them with this

mechanism in place (see Section 2.3.5.2 about extra credit).

12

2.3.4 Expected Output

All of the following output was generated by sending 5 messages (i.e., nsimmax = 5).

The output for the Go-Back-N protocol should look similar in format to Stop-and-Wait’s

output, but not identical. The main difference between the two is that the output for

Go-Back-N’s Sender includes information about the sliding window’s base value (the

second value in the parentheses).

2.3.4.1 Zero Loss and Corruption Probabilities

In the general test case without loss or corruption in the network, your output (excluding

the statistics section) should look like the following example. The output shows that all

of the messages are received correctly.

Sender-side values: (state, send_base, seqnum)

13

2.3.4.2 Non-Zero Loss and/or Corruption Probabilities

When the loss and/or corruption probabilities are set to a non-zero value, your output

should show corrupted and/or lost packets, packets with wrong sequence or

acknowledgment numbers, timeouts, etc. An example of such output (excluding the

statistics section) is shown below. The output shows that all of the messages are

eventually received correctly.

Note: Do not expect your output to be identical due to the non-deterministic behavior of

the simulation when it’s configured with non-zero loss and corruption probabilities.

Sender-side values: (state, send_base, seqnum)

14

2.3.5 Extra Credit

There are two different parts that you can implement to earn additional points. You do

not have to implement both of them.

Note: You need to add an Extra Credit section in your Phase 2 report to discuss which

parts you implemented and how they work. Your code needs to be working to receive

the extra credit points. Also, include your answers to the proposed questions for each

part in this report section.

2.3.5.1 Part 1: Buffered Application Layer Messages [10 points]

In the default scenario, if the window is not full, then a new packet is created and sent,

and variables are appropriately updated. If the window is full, then the Sender simply

drops the data. The application layer would have to try again later.

For the bonus implementation, the Sender would instead buffer this data (but not

immediately send it and assign it a sequence number) until the window is no longer full.

Later, the Sender can send the buffered data when there are available sequence

numbers to use (i.e., when the Sender receives an ACK from the Receiver for the

unacknowledged data currently in the window). Ensure that the Sender doesn’t have

more outstanding and unacknowledged data packets than the window size at any given

time.

Question: What are at least two advantages of using this buffer?

Note: For this part, the buffer and window size are two different things, as shown in the

diagram below. For example, the buffer size can be 50, and the window size is 8. The

send_base can point to the current packet in the buffer, say position 30, the sequence

numbers can be from 1 - 9, and the next place the Sender will store the next packet will

be send_base + nextseqnum. Then, when the Sender reaches the end of the buffer at

position 50, it can restart the buffer and fill packets at the beginning position of 1.

15

2.3.5.2 Part 2: Buffered Out-Of-Order Packets [5 points]

Implement a Receiver buffer to handle out-of-order packets. Remember that when

there is a timeout, the Sender will resend all packets in the current window; some of

them could have been corrupted, lost, or delivered correctly but out of order (i.e., not

having the next expected sequence number). The default behavior for the Receiver is to

drop these packets and wait for the Sender to resend them along with the ones that

were corrupted or lost. So the bonus part is to implement a buffer to store these

correctly received packets at the Receiver (even if they’re out of order) until the

expected packets before them arrive, and the Receiver can then use a cumulative ACK

(see Section 2.3.3) to acknowledge all of the packets that it has correctly received. For

example, suppose that the packet with sequence number 8 was lost, the packet with

sequence number 9 was corrupted, and the Receiver correctly received a packet with

sequence number 10. The Receiver can buffer the packet with sequence number 10,

and after it correctly receives packets 8 and 9, it can send a cumulative ACK for packet

10 and deliver packets 8, 9, and 10 to the application layer. Include in your Phase 2

report a screenshot with and without this part implemented to show the difference in

overall behavior.

Question: What are the advantages of using a buffer at the Receiver’s side? Is this

related to any other mechanism we have studied in Chapter 3? If yes, then which one?

2.4 Provided Starter Files

2.4.1 Skeleton Code

You are provided with starter code files that are written in Python. The provided Sender

and Receiver code files (SNW_Sender.py, SNW_Receiver.py, GBN_Sender.py, and

GBN_Receiver.py) are skeletons that you will need to complete according to the

instructions in the above sections. Also, the skeleton code files include TODO

comments for what you need to do and where. Remember that the TODO comments

are purposefully not a complete step-by-step guide that you should blindly follow and

that you will need to think on your own about what else the Sender and Receiver may

need to do. If a piece of code doesn’t have a TODO comment, then it should not be

modified at all. Also, don’t forget to use the included FSMs as a guide. All of the other

provided code files are complete and don’t require any changes to be made except for a

few in the simulator (simulator.py) when testing your code (see Section 2.5).

You can run the code for each phase by executing its corresponding main file, which is

mainSNW.py for Phase 1 and mainGBN.py for Phase 2.

16

Note: If you wish to complete the project in Java, then you need to contact the

instructors or TAs and receive explicit permission from them. Just know that if you

choose to use Java, then you will need to implement all of the code completely from

scratch. In addition, we highly recommend that you choose to implement the project in

Python because the Gradescope autograder will only function for Python submissions.

2.4.2 Software Interfaces

The procedures described in Sections 2.2.2 and 2.3.2 are the ones that you are

REQUIRED to write. The following routines are provided for you and should be called

by your routines:

● start_timer(calling_entity, increment), where calling_entity, for all the

following functions, is either the character "S" to represent the Sender or "R" to

represent the Receiver, and increment is a float value indicating the amount of

time that will pass before the timer interrupts. The timer should only be started (or

stopped) by Sender-side routines that use the value of self.estimated_rtt

defined in the Sender’s class to indicate the round trip time (RTT) between the

Sender and the Receiver. If this function is called when a timer is already

running, then it will stop the previous timer and start a new one. The

start_timer() method is implemented in the event_list class.

Example function call: evl.start_timer(self.entity, self.estimated_rtt)

● stop_timer(): You should call this function to stop the current timer. It is

implemented in the event_list class.

Example function call: evl.stop_timer()

● to_layer_three(calling_entity, packet), where packet is an instance of

packet: Calling this routine will cause the packet to be sent into the network,

destined for the other entity. It is implemented in the simulator class.

Example function call: to_layer_three(self.entity, packet)

● to_layer_five(calling_entity, message), where message is an instance of msg:

With unidirectional data transfer, you should only be calling this function in the

Receiver’s code with calling_entity equal to "R". This routine will cause the

message to be passed up to layer 5. It is implemented in the simulator class.

Example function call: to_layer_five(self.entity, packet.payload.data)

17

● get_checksum(): This function computes the checksum of a packet’s current

contents and can be used to verify the checksum stored within the packet. It is

implemented in the packet class.

Example function call:

if (received_packet.checksum == received_packet.get_checksum())

● send_ack(calling_entity, acknowledgment_number), where the

acknowledgment_number is an integer: With unidirectional data transfer, you

should only be calling this function in the Receiver’s code with calling_entity

equal to "R". This function can be used to send an explicit ACK (correct

acknowledgment number) or implicit NACK (acknowledgment number for the last

correctly received packet) from the calling entity to the other entity. It is

implemented in the packet class.

Example function call: send_ack(self.entity, 0)

● Update functions: Multiple fully implemented update functions are provided in the

Sender and Receiver code files and should be used throughout your code to

easily update key variables.

● S_/R_print_state_transition(transition_event), where transition_event is

one of the possible transition events based on the FSMs: Relevant information

about a state transition will be printed to the terminal. Immediately after the

Sender or Receiver does a state transition (i.e., by following an arrow) and

updates key variables according to the corresponding FSM, this function should

always be called.

Example function calls:

● S_print_state_transition(self.correct_ACK)

● R_print_state_transition(self.corrupt_data)

● S_print_circular_buffer(): This function is only implemented in the Go-Back-N

Sender because a circular buffer is not used in Stop-and-Wait. This function

prints out the size of the circular buffer and the sequence numbers of the

currently buffered packets in a readable format, which will be useful for

debugging. Call this function at your discretion.

18

2.4.3 The Simulated Network Environment

A call to the to_layer_three() procedure sends a packet into the network. Your

procedures S_input() and R_input() are called when a packet is to be delivered from

the network to your transport layer protocol. The network is capable of corrupting and

losing packets. It will not reorder packets. Before you run the simulation, you will need

to specify the following values regarding the simulated network environment in the

simulator class:

● Number of messages to simulate (nsimmax): The given emulator (and your

routines) will stop as soon as this number of messages has been passed down

from layer 5, regardless of whether or not all of the messages have been

correctly received at the Receiver. Thus, you don’t need to worry about

undelivered or unacknowledged messages still in your Sender when the

simulation stops.

● Loss (lossprob): You will update this value to specify a packet loss probability. A

value of 0.1 would mean that one in ten packets (on average) is lost. This

includes data and ACK packets.

● Corruption (corruptprob): You will update this value to specify a packet

corruption probability. A value of 0.2 would mean that one in five packets (on

average) is corrupted. Note that the contents of the payload and sequence

number fields can be corrupted. This includes data and ACK packets.

Note: If the values of lossprob and/or corruptprob are very high (i.e., at least 0.8),

then your simulation may get stuck in an infinite loop. This will occur because almost

every packet will be lost or corrupted, which will cause many retransmitted packets that

will also be lost or corrupted, and so on. If this happens, then stop the simulation,

increase Lambda or decrease the probabilities, and restart the simulation.

● The average time between messages from the Sender’s layer 5 (Lambda): You

can set this value to any non-zero, positive value. Note that the smaller the value

you choose, the faster packets arrive at the Sender’s RDT Protocol from layer 5.

You should choose a value large enough for the average time between

messages so that the Sender is not called while it still has an outstanding,

unacknowledged message it is trying to send to the Receiver. We suggest that

you choose a value of 1,000. More values will be suggested in Section 2.5.

19

2.5 Testing and Evaluation

● To test your code, you need to update the values of the nsimmax, lossprob,

corruptprob, and Lambda variables in the initialize method of the simulator

class. The meaning of these variables is explained in Section 2.4.3. The loss and

corruption probabilities are applied to both the data and ACK packets.

● First, start with Stop-and-Wait and test when lossprob = 0 and corruptprob =

0. Next, increase the value for either one of these probabilities while the other

one is still 0, and test your code. Finally, add non-zero values for both of them

together and test your code to make sure that it can handle packet loss and

corruption and that the Sender and Receiver can still transmit the packets

correctly to each other.

● Repeat the same steps to test Go-Back-N. Ensure it works without loss or

corrupted packets and then add values for the loss and corruption probabilities.

● Please include the simulation settings for nsimmax, lossprob, corruptprob,

and Lambda and the screenshots of the output for the different test cases for both

Stop-and-Wait and Go-Back-N in the Evaluation section of your report. Here are

the test cases to include in your report.

○ 1) nsimmax = 7, lossprob = 0, corruptprob = 0, Lambda = 1000

○ 2) nsimmax = 7, lossprob = 0.2, corruptprob = 0.3, Lambda = 1000

○ 3) nsimmax = 5, lossprob = 0.8, corruptprob = 0.8, Lambda = 1000

○ 4) nsimmax = 5, lossprob = 0.8, corruptprob = 0.8, Lambda = 100000

● For each test case, calculate and include a screenshot of the following statistics

in your report:

○ The total simulation time (time of the simulation from start to finish). This

will change with a change in the value of Lambda and the total number of

data messages. This is already calculated for you in the simulator class,

so you just need to analyze the given values.

○ Sender:

■ The total number of new and retransmitted data messages sent

during the simulation.

■ The number of lost data packets.

■ The number of retransmitted data packets.

20

■ The number of dropped data packets (due to being in the

WAIT_ACK state or the buffer being full).

■ The number of dropped ACK packets (i.e., corrupted or duplicate).

■ The number of corrupted ACK packets.

○ Receiver:

■ The total number of new and retransmitted ACKs sent during the

simulation.

■ The number of lost ACKs.

■ The number of retransmitted ACK packets.

■ The number of dropped data packets (i.e., corrupted or duplicate).

■ The number of corrupted data packets.

Note: We have defined and initialized all of these Sender and Receiver counters

for you as class variables, so you just need to update them in the appropriate

places in the Sender and Receiver only. Also, these statistics are printed for you

at the end of the simulation.

Answer these questions in the Evaluation section in your reports.

2.5.1 Stop-and-Wait

1. What are the basic mechanisms needed to implement reliable data transfer?

2. Comment and analyze the output in each of the 4 test cases mentioned above

and justify why it is happening.

3. Describe how your protocol correctly recovers from packet loss and corruption.

2.5.2 Go-Back-N

1. Comment and analyze the output in each of the 4 test cases mentioned above

and justify why it is happening.

2. Compare the performance of Go-Back-N with Stop-and-Wait for the same test

cases.

3. State the differences between Go-Back-N and Selective Repeat.

21

3. Additional Help

3.1 Helpful Resources

● This project is outlined by these RFCs:

○ RFC 908

○ RFC 3366

○ RFC 1151

● RDT Protocols

○ Alternating-Bit Protocol

○ Stop-and-Wait ARQ

○ Go-Back-N ARQ

3.2 General Advice

● Start Simple: Test your procedures for the case of no loss and no corruption (i.e.,

set the probabilities of loss and corruption to zero) and get them working first.

Then, handle the case of one of these probabilities being non-zero and, finally,

both being non-zero.

● Debugging: You are expected to use the provided print_state_transition()

functions throughout your code to track what’s going on in the Sender and

Receiver. You can also add more print statements when debugging your

procedures to show a wide variety of relevant information, such as when new

data becomes available from layer 5, the Sender’s and Receiver’s states,

whether the Sender must drop a message, etc. If you add your own print

statements, then we recommend that you start them off by " S:: " or " R:: " to

indicate whether the Sender or Receiver generated the output, respectively.

● Feel free to add any helper function(s) to the Sender and Receiver classes if

needed. However, make sure that you fully document them in your code and

explain them in the Description section in your report.

● Get Started Early!: Don’t wait until the last minute. Starting early will allow you

the opportunity to have more time to promptly receive any help that you may

require from the instructors and to debug your code calmly if any unexpected

and/or difficult problems arise.

22

4. Submission Information

4.1 Grade Breakdown

● Specifications / Correctness (70%)

○ (+30) Stop-and-Wait

○ (+40) Go-Back-N

● Documentation (30%)

○ (+ 30) Basic submission (report, code style, readability, code efficiency)

● Extra Credit (15%)

4.2 General Grading Criteria

4.2.1 Program Specifications / Correctness

This is the most important criterion. The program meets specifications and functions as

clearly described in the instructions. This means that it behaves as desired and

produces the correct output (see the example output provided) for a variety of inputs.

You should include basic error handling for code that will likely return an error value, but

it’s not required for every piece of code.

If a specification is ambiguous or unclear, then you have two choices: You can either

ask the TAs/instructor (preferred) or make a reasonable assumption about what is

required, based on what makes the most sense to you. If you make an assumption

about an ambiguous specification, then you should clearly mention that in your report so

that the reader/grader knows what you were thinking. However, points may be taken off

for poorly made assumptions.

4.2.2 Readability

Your code needs to be readable to both you and a knowledgeable third party. This

involves:

● Giving variables meaningful names. Variable names such as A, B, and C or foo,

bar, and baz give the reader no information whatsoever about their purpose or

what information they may hold. Names like sequence_number,

acknowledgment_number, and last_sent_packet are much more useful. Loop

variables are a common exception to this idea, and loop variables named i, j,

etc. are okay.

23

● The code should be well-organized. Functions should be defined in one section

of the program, code should be organized into functions so that blocks of code

that need to be reused are contained within functions to enable that, and

functions should have meaningful names.

● Using indentation consistently (e.g., every function’s body is indented to the

same level).

● Adding whitespace (blank lines, spaces) where appropriate to help separate

distinct parts of the code (e.g., adding a space after commas in lists, blank lines

between functions or between blocks of related lines within functions, etc.)

4.2.3 Documentation

Every file containing code should start with a header comment. At the very least, this

header should contain the name of the file, a description of what the included code

does, and the name of its author (you). Other details you might include are the date it

was submitted, a more detailed description of the approach used in the code if it is

complex or may be misunderstood, or references to resources that you used to help you

write it. All code should also be well-commented. This requires striking a balance

between commenting everything, which adds a great deal of unneeded noise to the

code, and commenting nothing, in which case the reader of the code (or you, when you

come back to it later) has no assistance in understanding the more complex or less

obvious sections of code. In general, aim to add a comment for any line of code that you

might not understand yourself if you come back to it in a month without having thought

about it in the interim.

A clear, concise, and well-written report should also be submitted. This file should be a

detailed description of your code, the logic used, any assumptions made, and a

complete data flow through your program. The details in this file should be such that, if

you looked at this program roughly a year from now, then you should still be able to

understand the execution, logic, and algorithms used in this program without reading

through the source code itself. You don’t need to explain any code that you did not

modify.

4.2.4 Code Efficiency

There are often many ways to write a program that meets a particular specification, and

several are often poor choices. They may be poor choices because they take many

more lines of code (and thus your effort and time) than needed, or they may take much

more of the computer’s time to execute than needed. For example, a specific code

section can be executed ten times by copying and pasting it ten times in a row or by

24

putting it in a simple for-loop. The latter is far superior and greatly preferred, not only

because it makes it faster to both write the code and read it later, but because it makes

it easier for you to change and maintain.

Although efficiency is somewhat beyond the scope of this programming assignment,

please ensure that your simulation does not take more than 1 minute to complete.

4.2.5 Assignment Specifications

Assignments will usually contain specifications and/or requirements outside of the

programming problems themselves. For example, the way you name your files to

submit them to Gradescope and the required format of their content will all be specified

in the assignment. Other instructions may be included as well, so pay close attention to

these details.

Ensure you follow all of the programming assignment’s write-up protocols, submission

guidelines, and/or required timelines. Carefully read and follow the provided

programming assignment instructions closely. Please feel free to post on Piazza or

email us if you have any questions or concerns.

4.3 Gradescope Autograder Details

This project is being manually graded, so there are no actual test cases in the

Gradescope autograder. Instead, there’s a dummy test case that simply checks whether

your code can execute without errors. Therefore, ensure that you’re thorough when

testing your code and account for corner cases.

4.4 What To Submit

Notes:

● Your submitted code must work on a Linux machine.

● Do not include any subfolders in your submission. Manually select all of the

required files and your report and then ZIP them rather than zipping the folder

that contains them. If you ZIP your files incorrectly, then the (dummy) autograder

will fail.

25

4.4.1 Phase 1

You must submit to the class Gradescope website a ZIP file (.zip format), named

<StudentID-FirstName_LastName>-project2-phase1.zip (example:

1234567-Alice_Jones-project2-phase1.zip), that contains the following files:

● Your modified Sender code using Stop-and-Wait (as SNW_Sender.py)

● Your modified Receiver code using Stop-and-Wait (as SNW_Receiver.py)

● A PDF report (as phase1-report.pdf). Refer to Sections 2.5, 3.2, 4.2.1, and

4.2.3 to see what this report should contain.

4.4.2 Phase 2

You must submit to the class Gradescope website a ZIP file (.zip format), named

<StudentID-FirstName_LastName>-project2-phase2.zip (example:

1234567-Alice_Jones-project2-phase2.zip), that contains the following files:

● Your modified Sender code using Go-Back-N (as GBN_Sender.py)

● Your modified Receiver code using Go-Back-N (as GBN_Receiver.py)

● A PDF report (as phase2-report.pdf). Refer to Sections 2.5, 3.2, 4.2.1, and

4.2.3 to see what this report should contain.

Note: If you attempted to implement any of the extra credit, then you MUST add

a section in your report explaining how your implementation works. Include your

answers to the proposed questions for each part you implemented here (see

Section 2.3.5).

4.5 Common Error Checks

Please read this bit – incorrect submissions will lose points, and “details” like file naming

can easily be done wrong. Your submission process should be as follows:

1. Check your work against the provided instructions and general grading criteria

above one last time.

2. Create a ZIP file of the folder containing your work.

3. Upload the ZIP file to Gradescope.

26

4. Make sure that your submission passes the (dummy) test case. If the test case

fails and it’s before the deadline, then you can take the opportunity to try to fix the

problem(s) and resubmit as many times as you want until you pass this (dummy)

test case.

5. Download your submission from Gradescope.

6. Unzip it (where it is, usually in your Downloads folder).

7. Confirm that your submission includes all the required files and still works as

intended.

27


相关文章

【上一篇】:到头了
【下一篇】:没有了

版权所有:编程辅导网 2021 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。 站长地图

python代写
微信客服:codinghelp