Time out - transport layer, Computer Networking

Assignment Help:

Time  out

Timers  are used to protect  against  lost packet. Each  packet  must have its own logical  timers since  only  a single  packet  will be retransmitted  after timeout. A single  hardware timer can be used to mimic  the function of  multiple logical  timers.

The SR receiver  will  acknowledge  a correctly received packet whether or not it is  in order. Out of order packets  are buffered  until any missing packets ( that  is packets with lower  sequence numbers) are received. The  various actions  taken by the SR receiver.

Packet  with  sequence  number in ( rev base re base + N- 1) is correctly received. In  this case  the received packet falls within the  receiver window  and a selective ACK  packet  is returned  to the  sender.

If  the packet was not  previously  received it  is buffered. If this  packet  has a sequence number  equal to the base of the  window  then this  packet  and any  previously  buffered  and consecutively numbered packets are delivered to the receiver. The  receiver window is them moved  forward  by the number of packets  delivered to the receiver as in figure when a packet  with a  sequence number of 2 is  received  then packets 3, 4 and 5 can  be delivered to the receiver.

Packet with  sequence  number in  ( rev base n rev base-1)  is received. In  this case an ACK  must be  generated this is the packet  which  the receiver has previously  acknowledge.

Otherwise ignores the  packets.

To understand  the functions of SR protocols  lets  take an example  of a window  size of  four packets. The sender  can sends  packets 0 to 3. If  first  packet pkt 0 is  lost  and pkt 1 , 2   and 3 are received by the  receiver instead of discarding these  packets  the receiver  buffers  the packets  and send  the ACK  for the  packets  respectively. After the  time out  of pkt 0 the sender  can retransmit this  lost  packet  pkt 0 if  the receiver receives the lost  packet  pkt 0  then the  receiver deliver all the  packets  which  was kept  buffered  by the  receiver previously.


Related Discussions:- Time out - transport layer

Digital encoding scheme, what are the applications of different encoding sc...

what are the applications of different encoding schemes

Explain about multiplicative decrease, Q. Explain about Multiplicative Decr...

Q. Explain about Multiplicative Decrease ? Multiplicative Decrease (MD) if a time-out take places the threshold is set to one maximum segment size (TCP Tahoe, TCP Reno).

Compute the number of lost packets of the down-stream, A mobile host (MH) i...

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80

Modeling a wan, To model a WAN, we need a graph in which the nodes model sw...

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d

Determine sonet devices, Sonet Devices STS Mux or DMux either multiplex...

Sonet Devices STS Mux or DMux either multiplexes signals from multiple sources into an STS or demultiplexes an STS into different destination signals. Regenerator is a repea

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

Objectives of param algorithem, After going through this part, you should b...

After going through this part, you should be capable to: Describe the concepts of message passing programming; List out the various communication modes for communication

Building a defense in networking, Q. Building a Defense in networking? ...

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

Explain sonet frame transaction, Sonet Frame Transaction Transmitted ...

Sonet Frame Transaction Transmitted one subsequent to another without any gap in between. First 2 bytes - alignment bytes. F628 in Hex. - define the beginning of every

Advantages and disadvantages of public and private network, The disadvantag...

The disadvantages and advantages of Private and Public networks are shown in the table below:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd