Reliable data transfer - transport layer, Computer Networking

Assignment Help:

Reliable Data Transfer

Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel  through  which data  can be  transferred. With a reliable channel  no transferred data  bits  are corrupted ( flipped  from o to 1or  vice  versa)  or lost  and all are  delivered in the order  in which  they  were  sent. This is  precisely the service model  offered by TCP  to the internet application that invoke it.

1250_Reliable Data Transfer.PNG

 

                                                Figure Reliable data transfer: Service model service implementation

It is  the responsibility  of a reliable  data transfer  protocol to implement  this servers  abstraction. This task  is made  difficult by the fact that the  layer below the  reliable data  transfer protocol  may be unreliable. For example  IP is a reliable data  transfer  protocols  that is  implemented on top of  an unreliable IP  end to end network  layer.

In this section we will incrementally develop the sender  and receiver sides of a reliable  data  transfer  protocols, considering  increasingly  complex models  of the  underlying  channel. Figure illustrates the interfaces for our  data transfer protocols.

a.When the  application wants  to send data, it  calls  rdit send  to activate teh transport  protocols.

b.The transport  protocols  builds a packet  and cells  udt send to send to  packet  over the lower  layer.

c.On the  receiving  side  when the  lower  layer  protocols has a packet  to deliver  it calls  rdt rcv .

d.The transport  protocols  extracts the data from  teh packet  and delivers the data  to the  applications  by calling  deliver  data.

e.This protocols  is called rdt 1.0.


Related Discussions:- Reliable data transfer - transport layer

Describe the count-to-infinity problem in distance vector, Describe the cou...

Describe the count-to-infinity problem in distance vector

Summary of special ip addresses, The table below gives a summary of special...

The table below gives a summary of special IP addresses.

Write the concept of simplex, Describe Concept of Simplex, Half Duplex and ...

Describe Concept of Simplex, Half Duplex and Full Duplex dialogs?

Role of software in intranet, Role of Software in Intranet For an Intr...

Role of Software in Intranet For an Intranet to be successful, it must have strong software support. In this section, a brief description of the operating system, groupware an

Http is stateless - discuss this statement, Question : (a) Describe, w...

Question : (a) Describe, with the aid of a diagram, a hybrid topology of a network of your choice. (b) Briefly explain the similarity and differences between a switch and

What is primary and secondary ring - fddi, What is primary and secondary ri...

What is primary and secondary ring One of the two FDDI rings is known as the primary ring; the other is called the secondary ring. The primary ring is utilized for data tra

Quality of service, Networks are more frequently being prepared to allow sp...

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para

Network, What are the main features of TCP connections? Why is it said that...

What are the main features of TCP connections? Why is it said that TCP provides full-duplex service?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd