Reliable data transfer over a channel bit error rdt : 20, Computer Networking

Assignment Help:

Reliable  data  transfer over a channel bit error  rdt : 20

A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit errors typically  occurs  in the physical   components  of a network as a packet  is transmitted propagates or is buffered.

Before  developing a  protocols  for reliably  communication over  such a channel  receiver might  say ok after  each  sentence has bee beard understood an recorded. It the receiver hears a garbled sentence he asked to  repeat the garbled sentence, this message  dictation protocols uses both positive acknowledgment and negative acknowledgments  these control  messages allows  receiver correctly and what has  been received in error  and thus  requires repeating.

Figure  shows  the FSM representation of rdt 2.0 a data  transfer  protocols  employing  error   detection positive  acknowledgments  and negative  acknowledgments.

545_Reliable  data  transfer.PNG

                                                     Figure  rdt 2.0 FSM specification

The send  side of  rdt 2.0  has two states. In the left  state  the send  side  protocols  is waiting  for data  to be passed  down  form the  upper  layer  when  the rdt send event occurs the sender will create a packet containing  the data  to be sent along  with  a packet  checksum  and then  send  the packet  via  duct send operation. In the  right most  state the sender protocols is waiting  for an ACK or a NACK  packet  from the  receiver. If an ACK  packet  is received. The sender  knows that the most recently transmitted  packet  has been  received correctly  and thus  the protocols  returns to  the state  of waiting  for data  from the upper layer. If  a NACK is received the  protocols retransmits  that last  waits  for an ACK or NACK to be returned by the receiver in response to the  retransmitted data  packet. It is  important to note that when  the sender  is in the  wait for  ACK or NACK state it  cannot get  move data from the  upper layer that is  the rdt send event  cannot occur that will happen  only after the sender receives an  ACK  and leaves this state. Thus  the sender will  not send  a new  piece  of data until. It is sure  that the  receiver has correctly received the current  packet  because  of this  behaviour  protocols  such  as rdt 2.0  are known as stop  and  wait  protocols.

The receiver  side FSM for rdt 2.0  still  has a single  state on  packet  arrival the  receiver replies  with either an ACK  or a NACK. Depending  on whether  not  the  received  packet in corrupted. In  figure the notation rdt rev and corrupt  corresponds to the event in which  a packet  is received and is  found to be in error. Protocols rdt 2.0 many  look  as if  it works  but  unfortunately it has  a fatal flaw  or may be possible  that the  ACK or NACK  packet  could be corrupted.

Possibilities  for handling corrupted ACKs or NACKs

a.For  the first  possible it the sender didn't  understand  the ok or please repeat that reply  from the  receiver the sender  would  probably ask what did you say? The  sender  would  then repeat the reply. But  what if the  speaker what did you  say? Is corrupted  the receiver having  no idea whether difficult to understand the garbled sentence was part  of the dedication or a request to repeat he last reply, would  probably  then respond  with  did you  say?  And then  of course  that  response  might be garbled.

b.A second  alternative  is to  enough checksum bits to allow  the sender not only  to defect but also  to recover from bit errors. This solves  the immediate problem  for a  channel  that can  corrupt  packets  but not  lose them.

c.A third  approach  is for the  sender simply  resend the current  data packet when it  receives a garbled ACK or NACK  packet. This  approach  introduces duplicate packets  into  the sender to receiver channel. The fundamental problem with  duplicate packets is that the  receiver doesn't  know  whether the ACK or NACK  it last  sent was  received  correctly at eh sender. To  handling  the duplicate packets sender. Sender  adds sequence number  to each packet  retransmits  current  packet  if ACK / NACK  garbled  receiver discards  duplicate  packets.


Related Discussions:- Reliable data transfer over a channel bit error rdt : 20

Packet sizes, Large data packets result in fewer load because a smaller par...

Large data packets result in fewer load because a smaller part of the packet is used for header information. Optimum networks use 4kB data packets or larger. Large data packets

Difference between multiprogramming and multithreading, Question: a) L...

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

What is client and server, What is Client/Server? Clients and Servers a...

What is Client/Server? Clients and Servers are part logical entities that work together over a network to accomplish a task. Lots of systems with very dissimilar architectures

Dijkstra algorithms - network layer and routing , Dijkstra Algorithms T...

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

State the network environment of intranets and internet, State the Network ...

State the Network environment of Intranets and Internet Intranets as well as the Internet are based purely on networks, the company intending to install Intranet must consider

Illustrate the working of networking bus topology, Illustrate the working o...

Illustrate the working of networking Bus Topology All stations attach, by appropriate hardware interfacing called as a tap, directly to a linear transmission medium, or bus. F

What is frequency borrowing, What is Frequency borrowing In the simples...

What is Frequency borrowing In the simplest case, frequencies are taken from adjacent cells by congested cells. The frequencies can also be assigned to cells dynamically.

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

What is multistation access unit, Multistation Access Unit (MAU) C...

Multistation Access Unit (MAU) Combines individual automatic switches May perhaps daisy chain to support more stations

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd