Reliable data transfer over a channel bit error rdt : 20, Computer Networking

Assignment Help:

Reliable  data  transfer over a channel bit error  rdt : 20

A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit errors typically  occurs  in the physical   components  of a network as a packet  is transmitted propagates or is buffered.

Before  developing a  protocols  for reliably  communication over  such a channel  receiver might  say ok after  each  sentence has bee beard understood an recorded. It the receiver hears a garbled sentence he asked to  repeat the garbled sentence, this message  dictation protocols uses both positive acknowledgment and negative acknowledgments  these control  messages allows  receiver correctly and what has  been received in error  and thus  requires repeating.

Figure  shows  the FSM representation of rdt 2.0 a data  transfer  protocols  employing  error   detection positive  acknowledgments  and negative  acknowledgments.

545_Reliable  data  transfer.PNG

                                                     Figure  rdt 2.0 FSM specification

The send  side of  rdt 2.0  has two states. In the left  state  the send  side  protocols  is waiting  for data  to be passed  down  form the  upper  layer  when  the rdt send event occurs the sender will create a packet containing  the data  to be sent along  with  a packet  checksum  and then  send  the packet  via  duct send operation. In the  right most  state the sender protocols is waiting  for an ACK or a NACK  packet  from the  receiver. If an ACK  packet  is received. The sender  knows that the most recently transmitted  packet  has been  received correctly  and thus  the protocols  returns to  the state  of waiting  for data  from the upper layer. If  a NACK is received the  protocols retransmits  that last  waits  for an ACK or NACK to be returned by the receiver in response to the  retransmitted data  packet. It is  important to note that when  the sender  is in the  wait for  ACK or NACK state it  cannot get  move data from the  upper layer that is  the rdt send event  cannot occur that will happen  only after the sender receives an  ACK  and leaves this state. Thus  the sender will  not send  a new  piece  of data until. It is sure  that the  receiver has correctly received the current  packet  because  of this  behaviour  protocols  such  as rdt 2.0  are known as stop  and  wait  protocols.

The receiver  side FSM for rdt 2.0  still  has a single  state on  packet  arrival the  receiver replies  with either an ACK  or a NACK. Depending  on whether  not  the  received  packet in corrupted. In  figure the notation rdt rev and corrupt  corresponds to the event in which  a packet  is received and is  found to be in error. Protocols rdt 2.0 many  look  as if  it works  but  unfortunately it has  a fatal flaw  or may be possible  that the  ACK or NACK  packet  could be corrupted.

Possibilities  for handling corrupted ACKs or NACKs

a.For  the first  possible it the sender didn't  understand  the ok or please repeat that reply  from the  receiver the sender  would  probably ask what did you say? The  sender  would  then repeat the reply. But  what if the  speaker what did you  say? Is corrupted  the receiver having  no idea whether difficult to understand the garbled sentence was part  of the dedication or a request to repeat he last reply, would  probably  then respond  with  did you  say?  And then  of course  that  response  might be garbled.

b.A second  alternative  is to  enough checksum bits to allow  the sender not only  to defect but also  to recover from bit errors. This solves  the immediate problem  for a  channel  that can  corrupt  packets  but not  lose them.

c.A third  approach  is for the  sender simply  resend the current  data packet when it  receives a garbled ACK or NACK  packet. This  approach  introduces duplicate packets  into  the sender to receiver channel. The fundamental problem with  duplicate packets is that the  receiver doesn't  know  whether the ACK or NACK  it last  sent was  received  correctly at eh sender. To  handling  the duplicate packets sender. Sender  adds sequence number  to each packet  retransmits  current  packet  if ACK / NACK  garbled  receiver discards  duplicate  packets.


Related Discussions:- Reliable data transfer over a channel bit error rdt : 20

Show the basic handover types in umts, Question: (a) Show the main elem...

Question: (a) Show the main elements of the GSM system architecture and describe their functions. (b) Looking at the HLR/VLR database approach used in GSM-how does this arc

Show nonreturn to zero encoding, Q. Show Nonreturn to Zero encoding? - ...

Q. Show Nonreturn to Zero encoding? - Value of signal is for all time positive or negative - NRZ-L Signal level depends on bit represented; positive typically means 0

Internet client control task, Internet Client Control Task A distribut...

Internet Client Control Task A distributed system is to be implemented using networked PCs. The role of the system in this task is to implement an environmental control sys

Define the term - proxy servers, Define the term - Proxy servers These ...

Define the term - Proxy servers These types of firewalls have been further classified into two types: application level gateways and circuit level gateways. The application

TCP, TCP creates a reliable data transfer service, in addition to IP''s unr...

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP

Packets in eigrp, What are different kinds of packets in EIGRP?

What are different kinds of packets in EIGRP?

Packet switching - fundamentals of networks, Packet Switching In the  ...

Packet Switching In the  packet  switching network  type on specific  path is  used for  data  transfer. Instead the data is chopped up into  small  pieces called packed and s

Describe any good security technology, Describe any good security technolog...

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Explain file transfer protocol, Q. Explain File Transfer Protocol? - Fi...

Q. Explain File Transfer Protocol? - File Transfer Protocol (FTP) is a TCP/IP client-server application for copying files from one host to another -- Establishes two connect

Function of tcp - ip transport layer, Q. Function of TCP/IP Transport Layer...

Q. Function of TCP/IP Transport Layer ? TCP/IP Transport Layer - Defines two standard transport protocols UDP and TCP - TCP equipment a dependable data-stream protocol

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd