[Webinar] Streamline your web hosting managementRegister Today


SRMP sender

Posted on 2006-06-08
Medium Priority
Last Modified: 2010-04-15
Hi Experts,

I am writing SRMP sender program, and I dont know how to send SRMP_DATA, because I should send a packet , and then check if I receive ack for that packet, if not I will send the next packet, But I should keep track of each packet time_out, if for example,
I send packet1
t1=I get the current time
I check if I receive any thing
t2=I check the time
if (t2-t1)<2 seconds
I send packet2
and I should check again for timeout
I dont know exactly in which matter I should keep track of each packet and the timeout for each packet

this are some links of some websites how have done this before:





Question by:zahmadian
1 Comment
LVL 24

Accepted Solution

fridom earned 1500 total points
ID: 16867768
sorry, that makes no sense to me. You wrote:
"because I should send a packet , and then check if I receive ack for that packet, if not I will send the next packet"

If you do not have received the ack then this package is lost and you are going to send the next package? I would expect you retransmit that "lost" package.

Now as I understand is that you like to have a "reliable" protocol upon UDP. So the task you have to carry out are for me.
- keeping book about the send package, there transmittion time and there status
- dependen on the status you either "resend" packages or send the next package
- if you get an request that one package is missing you retransmit it.  

on the other side the following happens. The packages come in in an arbitrary order for that you keep a counter for the number of the package. You cashe the received packages till you get them all then you put them back into the right order.

If you see that package is missing after a certain time, you ask the sender to retransmit the package.

So you task is as I understand implementing this book-keeping. So go for it....


Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Windows programmers of the C/C++ variety, how many of you realise that since Window 9x Microsoft has been lying to you about what constitutes Unicode (http://en.wikipedia.org/wiki/Unicode)? They will have you believe that Unicode requires you to use…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The goal of this video is to provide viewers with basic examples to understand opening and writing to files in the C programming language.
The goal of this video is to provide viewers with basic examples to understand and use conditional statements in the C programming language.

591 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question