Reliable data transfer - transport layer, Computer Networking

Assignment Help:

Reliable Data Transfer

Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel  through  which data  can be  transferred. With a reliable channel  no transferred data  bits  are corrupted ( flipped  from o to 1or  vice  versa)  or lost  and all are  delivered in the order  in which  they  were  sent. This is  precisely the service model  offered by TCP  to the internet application that invoke it.

1250_Reliable Data Transfer.PNG

 

                                                Figure Reliable data transfer: Service model service implementation

It is  the responsibility  of a reliable  data transfer  protocol to implement  this servers  abstraction. This task  is made  difficult by the fact that the  layer below the  reliable data  transfer protocol  may be unreliable. For example  IP is a reliable data  transfer  protocols  that is  implemented on top of  an unreliable IP  end to end network  layer.

In this section we will incrementally develop the sender  and receiver sides of a reliable  data  transfer  protocols, considering  increasingly  complex models  of the  underlying  channel. Figure illustrates the interfaces for our  data transfer protocols.

a.When the  application wants  to send data, it  calls  rdit send  to activate teh transport  protocols.

b.The transport  protocols  builds a packet  and cells  udt send to send to  packet  over the lower  layer.

c.On the  receiving  side  when the  lower  layer  protocols has a packet  to deliver  it calls  rdt rcv .

d.The transport  protocols  extracts the data from  teh packet  and delivers the data  to the  applications  by calling  deliver  data.

e.This protocols  is called rdt 1.0.


Related Discussions:- Reliable data transfer - transport layer

What is icmp, What is ICMP? ICMP is Internet Control Message Protocol. ...

What is ICMP? ICMP is Internet Control Message Protocol. It gives messaging and communication for protocols within the TCP/IP stacks. This is also the protocol that manages err

Name the standard isdn term for a native isdn modem, The marketing term 'IS...

The marketing term 'ISDN modem' was formed to help sell the ISDN idea to America. There is no such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (

Disadvantages - point to point , Disadvantages You typically  would  no...

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Describe about the noiseless channel, Describe about the noiseless channel ...

Describe about the noiseless channel A noiseless channel can transmit an arbitrarily large amount of information, no matter how frequently it is sampled. Just send a lot of dat

Length- transport layer, Length This is a 16 bit  field  that  defines...

Length This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes.

Difference between trigger and rule, What is the difference between trigger...

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli

UDP Programming, I have a larget text file of 1MB, how do i break down into...

I have a larget text file of 1MB, how do i break down into chunks of packets to send over UDP? byte b[]=new byte[1024]; FileInputStream f=new FileInputStream("input.txt

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd