Reliable data transfer over a perfectly reliable channel r, Computer Networking

Assignment Help:

Reliable  data transfer  over a perfectly reliable channel rdt 1.0

First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protocols  itself  which in  trivia. The finite state  machine  definition for  the rdt 1.0 sender  and receiver are shown  in the FSM  in  defines the  operation of the sender while  the s FSM  defines the operation  of the  defines receiver. It is important  to note  that  there are separate FSM  for the  sender  and  of the receiver. The sender an deceiver FSM in figure  each have just  one  state. The  arrows  in the FSM  description indicate the transition of the protocols from one  state to another. The event causing the transition is shown above  the horizontal line  labelling the transition and the  actions  taken  when the  event occurs are shown below  the horizontal  lien when  no action  is taken  on an event  or no event  occurs   and an  action is  taken we  use the symbol a below or above the horizontal respectively  to explicitly denote the lack  of an action or event. The  initial  state of the FSM  is indicated by the  dashed arrow.

 

409_rdt a protocol for a completely  reliable  channel.png

 


                               Figure  rdt a protocol for a completely  reliable  channel

The sending  side of rdt  simply  accepts  data from  the upper  layer via the rdt send  event,  creates a packet  containing the data   and sends  the packet into the channel. The rdt send event would  result form  procedure call  by the upper layer  application.

On the receiving  side  rdt receives  a packet  from the  underlying channel via the rdt _rev event removes tha data from the  packet and passes the data  up to the upper layer. The  rdt_ rcv event would  result  from a procedure call  event from the lower layer  protocols.

In  this protocols  there  is no  difference  between a unit  of  data  and  a packet. Also  all packet  flow is  from  the sender  to receiver with a  perfectly  reliable  channel  there  is no  need for the  receiver  side to provide  any feedback to the sender.

 


Related Discussions:- Reliable data transfer over a perfectly reliable channel r

What is the virtual channel, A logical circuit that is created by Virtual c...

A logical circuit that is created by Virtual channel links. It carries data among two endpoints in a network. The one more name for Virtual Channel is Virtual Circuit.

Wifi and 3g, what is similarity of wifi and 3g

what is similarity of wifi and 3g

Hierarchical addressing and routing, The steps of forwarding the packets of...

The steps of forwarding the packets of information is known routing. The information about receivers is saved in routing tables. Note that several entries have same next hop. It is

What is meant by asymmetric multiprocessing (amp), It imposes hierarchy and...

It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated t

Chord, how to implement chord connection as the network management system ?...

how to implement chord connection as the network management system ?

Packet switching - fundamentals of networks, Packet Switching In the  ...

Packet Switching In the  packet  switching network  type on specific  path is  used for  data  transfer. Instead the data is chopped up into  small  pieces called packed and s

Describe the hardware complexity of benz network, Q. Describe the Hardware ...

Q. Describe the Hardware complexity of Benz Network? Hardware complexity of Benz Network:  Benz network employs lesser switches and it gives good connectivity. To come across h

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Compute the hash - part of the packet, In this question, we study Nested ES...

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd