Reliable data transfer over a perfectly reliable channel r, Computer Networking

Reliable  data transfer  over a perfectly reliable channel rdt 1.0

First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protocols  itself  which in  trivia. The finite state  machine  definition for  the rdt 1.0 sender  and receiver are shown  in the FSM  in  defines the  operation of the sender while  the s FSM  defines the operation  of the  defines receiver. It is important  to note  that  there are separate FSM  for the  sender  and  of the receiver. The sender an deceiver FSM in figure  each have just  one  state. The  arrows  in the FSM  description indicate the transition of the protocols from one  state to another. The event causing the transition is shown above  the horizontal line  labelling the transition and the  actions  taken  when the  event occurs are shown below  the horizontal  lien when  no action  is taken  on an event  or no event  occurs   and an  action is  taken we  use the symbol a below or above the horizontal respectively  to explicitly denote the lack  of an action or event. The  initial  state of the FSM  is indicated by the  dashed arrow.

 

409_rdt a protocol for a completely  reliable  channel.png

 


                               Figure  rdt a protocol for a completely  reliable  channel

The sending  side of rdt  simply  accepts  data from  the upper  layer via the rdt send  event,  creates a packet  containing the data   and sends  the packet into the channel. The rdt send event would  result form  procedure call  by the upper layer  application.

On the receiving  side  rdt receives  a packet  from the  underlying channel via the rdt _rev event removes tha data from the  packet and passes the data  up to the upper layer. The  rdt_ rcv event would  result  from a procedure call  event from the lower layer  protocols.

In  this protocols  there  is no  difference  between a unit  of  data  and  a packet. Also  all packet  flow is  from  the sender  to receiver with a  perfectly  reliable  channel  there  is no  need for the  receiver  side to provide  any feedback to the sender.

 

Posted Date: 3/11/2013 6:43:24 AM | Location : United States







Related Discussions:- Reliable data transfer over a perfectly reliable channel r, Assignment Help, Ask Question on Reliable data transfer over a perfectly reliable channel r, Get Answer, Expert's Help, Reliable data transfer over a perfectly reliable channel r Discussions

Write discussion on Reliable data transfer over a perfectly reliable channel r
Your posts are moderated
Related Questions
Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

Source to Destination Data Transfer - Datagram approach - Each packet is treated independently. - Every pkt will take its own path to reach the destination. - There i

To accept its goals, ATM uses fixed, small sized packets known cells. Every cell has 53 octets. VPI/VCI fields shows the cells destination. PRIO say if cell can be discarded CRC

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Disadvantages of OSPF protocol i) Single Area ii) High Hardware Requirements iii) Troubleshooting

What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol

Questions: A signal of amplitude 10 mV is fed to the amplifier in the figure. What is the amplitude of the voltage at the output from the amplifier?

Reliable  data transfer  over a perfectly reliable channel rdt 1.0 First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protoco

Destination unreachable Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What is SAP? Series of interface points that permit other computers to interact with the other layers of network protocol stack is known as SAP.