Go back-n ( gbn) - transport layer, Computer Networking

Assignment Help:

Go Back ( GBN)

Go back  N ARQ is specific  instance of the  automatic  repeat request protocols  in which  the sending  process continues to send  a number of frames specific by a window size  without receiving an ACK packet  from the  receiver. The receiver process  keeps  track  of the sequence number of the next  frame it  expects to receive and send that number  will every ACK it sends. If a frame from the send  does  not reach  the receiver the receive will  stop  acknowledging received frames. Once the sender has sent all of the  frames in its window  it will  detect that all of the  frames since the first  lost frame  are outstanding and will go back to sequence number of the last ACK  it received from  the receiver process and fill its window starting with  that frame  and continue the process over again. In simple  words  go back  n is connection oriented protocols  in which  the transmitter  has  a window of  sequence numbers  that may be transmitted  without  acknowledgment  thee receiver will only  accept the next  sequence number  it is expecting other  sequence number are silently ignored.

Figure  shows the  sender view  of the range  of sequence numbers  in a GBN  protocols, if  we define  base to  the sequence  number of the oldest unacknowledged packet and to be  the smaller unused  sequence number   then four intervals in the range of sequence numbers can be identified. Sequence numbers  in the interval  the interval  corresponds to packet that have been sent, but  not yet acknowledged  sequence  numbers in the interval can be used for packets that can  be sent  immediately  should   arrive from  the upper  layer. Finally  sequence numbers  greater than  or equal  to base + N cannot  be used until  an unacknowledged packet  currently  in the pipeline has been  acknowledged.

As  suggested by figure  the range  of permissible sequence numbers for  transmitted but  not yet  acknowledged packets  can be  viewed as a window  of size  n over the range  of sequence numbers. As  the protocols  operates this window slides forward over the sequence number space. For  this  reason N is often  referred to as the window  size and  the GBN  protocols  itself as sliding  window  protocols.

In practice a packet  sequence number  is carried  in a fixed length fields  in the  packet  header if K is the number  of bits in  the packet sequence number fields the range of  sequence numbers is thus [ 0, 2K -1] . with  a finite range  of sequence numbers , all  arithmetic involving  sequence number space can be thought of as a ring of size 2k arithmetic  that is the sequence number  space can be through a as a ring of size 2k. Where  sequence number 2k-1 is immediately followed  by sequence numbers

 

1437_Go Back ( GBN).PNG

                                         figure sender view of sequence number in Go Back -N


Related Discussions:- Go back-n ( gbn) - transport layer

Describe the specific ip-qos schemes, State how the different IP-QoS needs ...

State how the different IP-QoS needs for controling traffic, data and voice applications can be supported in your technology choice from Q7. Describe the specific IP-QoS schemes -

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Effectiveness of data communications, Efficiency of a data communications s...

Efficiency of a data communications system depends on three fundamental characteristics - Delivery: The system should deliver data to the correct destination. Data should be r

User server interaction - application layer , User Server Interaction ...

User Server Interaction Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship

Protocol layering - computer network, Protocol Layering To design  str...

Protocol Layering To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. E

Describe about radio waves, Radio Waves - Frequency ranges: 3 KHz to 1...

Radio Waves - Frequency ranges: 3 KHz to 1 GHz - Omni directional - Susceptible to interference by other antennas utilizing same frequency or band - Ideal for long-di

What do you understand by protocol, Q. What do you understand by Protocol? ...

Q. What do you understand by Protocol? Ans:  In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers interchange infor

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Explain about stored procedure, A stored procedure is a named collection of...

A stored procedure is a named collection of SQL statements and procedural logic that is compiled, verified and kept in a server database. It is typically treated like any other dat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd