Time out - transport layer, Computer Networking

Time  out

Timers  are used to protect  against  lost packet. Each  packet  must have its own logical  timers since  only  a single  packet  will be retransmitted  after timeout. A single  hardware timer can be used to mimic  the function of  multiple logical  timers.

The SR receiver  will  acknowledge  a correctly received packet whether or not it is  in order. Out of order packets  are buffered  until any missing packets ( that  is packets with lower  sequence numbers) are received. The  various actions  taken by the SR receiver.

Packet  with  sequence  number in ( rev base re base + N- 1) is correctly received. In  this case  the received packet falls within the  receiver window  and a selective ACK  packet  is returned  to the  sender.

If  the packet was not  previously  received it  is buffered. If this  packet  has a sequence number  equal to the base of the  window  then this  packet  and any  previously  buffered  and consecutively numbered packets are delivered to the receiver. The  receiver window is them moved  forward  by the number of packets  delivered to the receiver as in figure when a packet  with a  sequence number of 2 is  received  then packets 3, 4 and 5 can  be delivered to the receiver.

Packet with  sequence  number in  ( rev base n rev base-1)  is received. In  this case an ACK  must be  generated this is the packet  which  the receiver has previously  acknowledge.

Otherwise ignores the  packets.

To understand  the functions of SR protocols  lets  take an example  of a window  size of  four packets. The sender  can sends  packets 0 to 3. If  first  packet pkt 0 is  lost  and pkt 1 , 2   and 3 are received by the  receiver instead of discarding these  packets  the receiver  buffers  the packets  and send  the ACK  for the  packets  respectively. After the  time out  of pkt 0 the sender  can retransmit this  lost  packet  pkt 0 if  the receiver receives the lost  packet  pkt 0  then the  receiver deliver all the  packets  which  was kept  buffered  by the  receiver previously.

Posted Date: 3/12/2013 11:10:28 PM | Location : United States







Related Discussions:- Time out - transport layer, Assignment Help, Ask Question on Time out - transport layer, Get Answer, Expert's Help, Time out - transport layer Discussions

Write discussion on Time out - transport layer
Your posts are moderated
Related Questions
Distributed Shared Memory (DSM) systems copy a shared memory abstraction on loosely coupled architectures in order to allow shared memory programming despite missing hardware suppo

As a system administrator, you require to set up single Ethernet interface on the Cisco router to permit for both sap and Novell-ether encapsulations. Which set of commands will ac

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Delivering message through LAN: We have to devise method for delivering message through LAN phase to single, specific destination device. Sending device uses a hardware addres

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE

Mesh It is of two dimensional network.  In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi

Question: a) Briefly describe the purpose of Windows Powershell? b) Name ways software can be installed on Linux? c) What is an interrupt request? d) As the Networ