Reliable data transfer - transport layer, Computer Networking

Assignment Help:

Reliable Data Transfer

Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel  through  which data  can be  transferred. With a reliable channel  no transferred data  bits  are corrupted ( flipped  from o to 1or  vice  versa)  or lost  and all are  delivered in the order  in which  they  were  sent. This is  precisely the service model  offered by TCP  to the internet application that invoke it.

1250_Reliable Data Transfer.PNG

 

                                                Figure Reliable data transfer: Service model service implementation

It is  the responsibility  of a reliable  data transfer  protocol to implement  this servers  abstraction. This task  is made  difficult by the fact that the  layer below the  reliable data  transfer protocol  may be unreliable. For example  IP is a reliable data  transfer  protocols  that is  implemented on top of  an unreliable IP  end to end network  layer.

In this section we will incrementally develop the sender  and receiver sides of a reliable  data  transfer  protocols, considering  increasingly  complex models  of the  underlying  channel. Figure illustrates the interfaces for our  data transfer protocols.

a.When the  application wants  to send data, it  calls  rdit send  to activate teh transport  protocols.

b.The transport  protocols  builds a packet  and cells  udt send to send to  packet  over the lower  layer.

c.On the  receiving  side  when the  lower  layer  protocols has a packet  to deliver  it calls  rdt rcv .

d.The transport  protocols  extracts the data from  teh packet  and delivers the data  to the  applications  by calling  deliver  data.

e.This protocols  is called rdt 1.0.


Related Discussions:- Reliable data transfer - transport layer

Explain communications channels, A communications channel is pathways over ...

A communications channel is pathways over which information can be communicate. It may be described by a physical wire that connects communicating devices, or by a radio, laser, or

Explain peer-to-peer networking model, Explain Peer-to-Peer Networking Mode...

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

Modern computer , modern technology in world of 21 century

modern technology in world of 21 century

Independent loops statement, INDEPENDENT Loops HPF gives additional opp...

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

How firewall configuration makes all the difference, How Firewall configura...

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd