Determine the window positions for succession of events, Computer Networking

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is receiving, in the figure below show the window positions for the following succession of events:

a)  after A sends frames 0, 1, 2, 3 and before any acknowledgments from B are received

b)  after A sends all new frames it is allowed to send following a successful reception of acknowledgment to frame 1

c)  just after acknowledgment to frame 2 arrives (but before any more frames are sent) Use diagonal crosses to show sequence numbers of packets sent but not yet acknowledged, and circles to show sequence numbers of packets node A is allowed to send

2054_Determine the Window Positions for Succession of Events.png

Posted Date: 3/25/2013 6:21:46 AM | Location : United States







Related Discussions:- Determine the window positions for succession of events, Assignment Help, Ask Question on Determine the window positions for succession of events, Get Answer, Expert's Help, Determine the window positions for succession of events Discussions

Write discussion on Determine the window positions for succession of events
Your posts are moderated
Related Questions
TCP (Transmission Control Protocol) and UDP are used by TCP/IP. SPX (Sequenced Packet Exchange) is used with IPX. NBP (Name Binding Protocol) is used with Appletalk.

There are basically two functions for creating routing tables, which are as given: Manual entry Software Further there are two types for computing routing table inf

If the amount of the application runs on the Client side, then it is Fat clients. It is mostly used for decision support and personal software. If the amount of the application

Cell splitting  In practice, the distribution of traffic and topographic features is not uniform, and this shows opportunities of capacity enhance. Cells in areas of high usage

When we specifically block, single router update for other routers

Tree topology Comments 1 - This features star nodes on a bus network 2 - All the disadvantages and advantages of both types of networks described above apply to this s

Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s

DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde

how does the near/far effects infulence TDMA system?what happen CDMA system? what are countermeasures in TDMA system/

What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and corrected. Error Detection uses