Selective repeat (sr) - transport layer, Computer Networking

Selective Repeat (SR)

Selective repeats is a connection oriented protocols  in which  transmitter and receiver have a window  of sequence numbers. SR scheme  avoids  the  unnecessary  retransmission of  the GBN  scheme. In this scheme  those  suspicious packets which were  packets received with errors. This  individual  as needed then the retransmission wil require for  packets which the  receiver individually acknowledge  correctly. A window  size of N will again  be used to  limit the number  of outstanding unacknowledged packets in the pipeline. However  unlike  GBN  the sender  will have  already received ACKs  for some of the  packet in the window figure e3.23 show  the SR sender view  of the sequence number space.

1881_Selective Repeat (SR).png

                                          figure selective  repeat sender and receiver views of sequence number space.

Posted Date: 3/12/2013 12:10:46 AM | Location : United States







Related Discussions:- Selective repeat (sr) - transport layer, Assignment Help, Ask Question on Selective repeat (sr) - transport layer, Get Answer, Expert's Help, Selective repeat (sr) - transport layer Discussions

Write discussion on Selective repeat (sr) - transport layer
Your posts are moderated
Related Questions
One of the most popular models for designing parallel algorithms is PRAM (Parallel Random Access Machine). A PRAM consists of unbounded number of processors interrelating with each

Session layer examples are Netbios Names, SQL, NFS, X Windows, and RPC

A layer of a glass surrounding the center fiber of glass under a fiber-optic cable.

Question 1: (a) How are IPv4 addresses transformed into IPv6 addresses using IPv4 compatible addresses? (b) Name some of the simplifications that were introduced in IPv6.

Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are g

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

Besides these hardware overheads, there are certain software overheads imposed by libraries, parallel compilers, tools and operating systems. The parallel programming languages

Distributed Shared Memory (DSM) systems copy a shared memory abstraction on loosely coupled architectures in order to allow shared memory programming despite missing hardware suppo

Q. Show the properties of Microwaves? Microwaves - Frequencies among 1 and 300 GHz - Unidirectional - Narrow focus requires sending as well as receiving antennas to