Reliable data transfer - transport layer, Computer Networking

Assignment Help:

Reliable Data Transfer

Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel  through  which data  can be  transferred. With a reliable channel  no transferred data  bits  are corrupted ( flipped  from o to 1or  vice  versa)  or lost  and all are  delivered in the order  in which  they  were  sent. This is  precisely the service model  offered by TCP  to the internet application that invoke it.

1250_Reliable Data Transfer.PNG

 

                                                Figure Reliable data transfer: Service model service implementation

It is  the responsibility  of a reliable  data transfer  protocol to implement  this servers  abstraction. This task  is made  difficult by the fact that the  layer below the  reliable data  transfer protocol  may be unreliable. For example  IP is a reliable data  transfer  protocols  that is  implemented on top of  an unreliable IP  end to end network  layer.

In this section we will incrementally develop the sender  and receiver sides of a reliable  data  transfer  protocols, considering  increasingly  complex models  of the  underlying  channel. Figure illustrates the interfaces for our  data transfer protocols.

a.When the  application wants  to send data, it  calls  rdit send  to activate teh transport  protocols.

b.The transport  protocols  builds a packet  and cells  udt send to send to  packet  over the lower  layer.

c.On the  receiving  side  when the  lower  layer  protocols has a packet  to deliver  it calls  rdt rcv .

d.The transport  protocols  extracts the data from  teh packet  and delivers the data  to the  applications  by calling  deliver  data.

e.This protocols  is called rdt 1.0.


Related Discussions:- Reliable data transfer - transport layer

Illustrate the downside of groupware, Illustrate the downside of groupware ...

Illustrate the downside of groupware The downside of groupware is that they are very costly and with the increase in complexity or additional features, the cost increases propo

Explain logical ring physical star topology, Explain Logical Ring Physical ...

Explain Logical Ring Physical Star topology for Token-Passing Standard. It is definite that any break in the ring at any point will interrupt communications for all machines.

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Define encoder, Define Encoder? A device or program that uses predefine...

Define Encoder? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to change

Error detection and correction, Error detection and correction The digi...

Error detection and correction The digital traffic stream of second generation systems also lends itself to the use of error detection and correction methods. The result can be

What is backbone network, What is backbone network? A backbone network ...

What is backbone network? A backbone network is a centralized infrastructure that is intended to distribute dissimilar routes and data to various networks. It also handles mana

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

Networking concepts and applications, iLab 2: Office Network Expansion ...

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Calculate the modulation index and find the bandwidth, Consider a signal x(...

Consider a signal x(t) = 10 cos(2πfct + 4 cos 2πfmt). Assume frequency modulation. The message frequency fm = 2:3 kHz. Calculate the modulation index and find the bandwidth when

Determine the subnet with subnet prefix, Consider a subnet with subnet pref...

Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd