Reliable data transfer - transport layer, Computer Networking

Assignment Help:

Reliable Data Transfer

Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel  through  which data  can be  transferred. With a reliable channel  no transferred data  bits  are corrupted ( flipped  from o to 1or  vice  versa)  or lost  and all are  delivered in the order  in which  they  were  sent. This is  precisely the service model  offered by TCP  to the internet application that invoke it.

1250_Reliable Data Transfer.PNG

 

                                                Figure Reliable data transfer: Service model service implementation

It is  the responsibility  of a reliable  data transfer  protocol to implement  this servers  abstraction. This task  is made  difficult by the fact that the  layer below the  reliable data  transfer protocol  may be unreliable. For example  IP is a reliable data  transfer  protocols  that is  implemented on top of  an unreliable IP  end to end network  layer.

In this section we will incrementally develop the sender  and receiver sides of a reliable  data  transfer  protocols, considering  increasingly  complex models  of the  underlying  channel. Figure illustrates the interfaces for our  data transfer protocols.

a.When the  application wants  to send data, it  calls  rdit send  to activate teh transport  protocols.

b.The transport  protocols  builds a packet  and cells  udt send to send to  packet  over the lower  layer.

c.On the  receiving  side  when the  lower  layer  protocols has a packet  to deliver  it calls  rdt rcv .

d.The transport  protocols  extracts the data from  teh packet  and delivers the data  to the  applications  by calling  deliver  data.

e.This protocols  is called rdt 1.0.


Related Discussions:- Reliable data transfer - transport layer

Why we use numbering frames, Q. Why we use numbering frames? Why numbe...

Q. Why we use numbering frames? Why numbering frames? Stop--and-wait ARQ, 1. Numbering Frames prevents the retaining of duplicate frames.. 2. Numbered acknowled

Hardware component used to store buffers, Recognize the hardware component ...

Recognize the hardware component used to store buffers, tables, running-configuration etc? Ans) RAM is the dynamic memory area. ROM have the boot strap code, NVRAM have the star

Show scalability and reliability of computer network, How do you account fo...

How do you account for higher scalability and reliability of computer network? Ans: Computer network will have a large number of computers, which can share database, software

How to define a constant variable in java, How to define a constant variabl...

How to define a constant variable in Java? The variable should be declared as static and final. So only one copy of the variable exists for all instances of the class and the v

computer computinons, Difference between synchronous tdm and statistical t...

Difference between synchronous tdm and statistical tdm

Assignement, I have an asignement regarding TCP tunning and optimization. C...

I have an asignement regarding TCP tunning and optimization. Can you help?

CLIENT SERVER BLACKJACK, So for this project, we’re going to make a game. ...

So for this project, we’re going to make a game. This game will make use of a server to join two clients together for a modified game of Blackjack.

Virtual private network, Virtual Private Network (VPN) adds the features of...

Virtual Private Network (VPN) adds the features of both public and private  networks. It is fixed to single organization and needs public network for connectivity. These connect

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd