Reliable data transfer over a perfectly reliable channel r, Computer Networking

Assignment Help:

Reliable  data transfer  over a perfectly reliable channel rdt 1.0

First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protocols  itself  which in  trivia. The finite state  machine  definition for  the rdt 1.0 sender  and receiver are shown  in the FSM  in  defines the  operation of the sender while  the s FSM  defines the operation  of the  defines receiver. It is important  to note  that  there are separate FSM  for the  sender  and  of the receiver. The sender an deceiver FSM in figure  each have just  one  state. The  arrows  in the FSM  description indicate the transition of the protocols from one  state to another. The event causing the transition is shown above  the horizontal line  labelling the transition and the  actions  taken  when the  event occurs are shown below  the horizontal  lien when  no action  is taken  on an event  or no event  occurs   and an  action is  taken we  use the symbol a below or above the horizontal respectively  to explicitly denote the lack  of an action or event. The  initial  state of the FSM  is indicated by the  dashed arrow.

 

409_rdt a protocol for a completely  reliable  channel.png

 


                               Figure  rdt a protocol for a completely  reliable  channel

The sending  side of rdt  simply  accepts  data from  the upper  layer via the rdt send  event,  creates a packet  containing the data   and sends  the packet into the channel. The rdt send event would  result form  procedure call  by the upper layer  application.

On the receiving  side  rdt receives  a packet  from the  underlying channel via the rdt _rev event removes tha data from the  packet and passes the data  up to the upper layer. The  rdt_ rcv event would  result  from a procedure call  event from the lower layer  protocols.

In  this protocols  there  is no  difference  between a unit  of  data  and  a packet. Also  all packet  flow is  from  the sender  to receiver with a  perfectly  reliable  channel  there  is no  need for the  receiver  side to provide  any feedback to the sender.

 


Related Discussions:- Reliable data transfer over a perfectly reliable channel r

Describe differential manchester, Q. Describe Differential Manchester? ...

Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o

Design a network security policy, SSK Software Corporation has opened an of...

SSK Software Corporation has opened an office in Toledo, Ohio. The office will have a wireless Wi-Fi (WLAN), and a Corporate wired Ethernet LAN. Workstation requirements are as

Service paradigm, At the minimum level most networks sends individual packe...

At the minimum level most networks sends individual packets of data and the network needs each packet to follow an exact format dictated by the hardware, which is known service par

Advantages - point to point , Advantages There are  times when  using ...

Advantages There are  times when  using  packet filters makes  sense. If the  connections require high  throughput  or the protocols  has proprietary technology that makes  it

Give some examples of private network addresses, Give some examples of priv...

Give some examples of private network addresses. 10.0.0.0 with a subnet mask of 255.0.0.0 172.16.0.0 with subnet mask of 255.240.0.0 192.168.0.0 with subnet mask of 255.2

State the example of security audit as case study, State the Example of sec...

State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain

High availability - application layer, High Availability Oracle web  c...

High Availability Oracle web  cache supports  content  aware  load  balancing  and fail  over  detection. The  features ensure that cache messes are directed to the most  avai

What are the unix-based firewalls, What are the Unix-based firewalls T...

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

What are the tools sued for cryptography and web security, Q. What are the ...

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

Explain torus interconnection networks, Torus: The mesh network with wrap ...

Torus: The mesh network with wrap around connections is termed as Tours Network. Figure: Torus network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd