Determine the window positions for succession of events, Computer Networking

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is receiving, in the figure below show the window positions for the following succession of events:

a)  after A sends frames 0, 1, 2, 3 and before any acknowledgments from B are received

b)  after A sends all new frames it is allowed to send following a successful reception of acknowledgment to frame 1

c)  just after acknowledgment to frame 2 arrives (but before any more frames are sent) Use diagonal crosses to show sequence numbers of packets sent but not yet acknowledged, and circles to show sequence numbers of packets node A is allowed to send

2054_Determine the Window Positions for Succession of Events.png

Posted Date: 3/25/2013 6:21:46 AM | Location : United States







Related Discussions:- Determine the window positions for succession of events, Assignment Help, Ask Question on Determine the window positions for succession of events, Get Answer, Expert's Help, Determine the window positions for succession of events Discussions

Write discussion on Determine the window positions for succession of events
Your posts are moderated
Related Questions
What is the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. I

Which layer is responsible for negotiating data transfer syntax? Ans) The Presentation layer does the following: Manages data representation conversions, or data transfer syntax

Routing Table Each  router now  uses the  shortest path tree to construct its routing table . each  router  uses the same algorithm and the same link state  database its own sh

Most networks give dynamic connections, which last for a relatively short period. To operate this, ATM can dynamically join a switched virtual circuit (SVC), allow it last as long

Q. Explain about Nonboundary-Level Masking? Nonboundary-Level Masking Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet addres

What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

What are the various security measures A matter of prime concern to companies is the overheads in the form of huge investment on extra hardware and software. It is quite possi

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

Authoritative DNS Servers Every  organization with publicly  accessible hosts  ( such  as web  server and mail  several  on the  internet  must  provide  publicly accessible D

What are all the Base services provided by the OS? Interprocess communications (IPC) Task preemption Task priority Local/Remote Interprocess communication Semaphor