Preview

Sliding Window Protocol

Satisfactory Essays
Open Document
Open Document
351 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sliding Window Protocol
Sliding Window Protocol
Introduction:
Sliding window protocol is used where a reliable transmitting of frame is required. It relies on packeting the frame queue to a definable window size which is provided to sender and receiver.
Sliding window protocol defines maximum transmitter window size, Ws which is always one less than the sequence number.
How transmitter window is defined: It is contains the data that are ready to be send. The lower limit in transmitter window which is waiting for acknowledgement is Slast .The upper limit frame in transmitter window is Slast + ws -1.Also each transmitted frame is allocated by a timer that when itès expire sender determines to retransmit that frame. On the other side, receiver pointer is pointing to the next expecting frame by Rnext. R next goes forward by each error free frame. To have an accurate transitions receiver request this has to be established:
Rnext Slast let’s say sLast is 2 it means the last frame, sender has send is 2 so receiver should request next one which is 3. If assume there is 8 sequence numbers N=0, 1, 2,3,4 so the size of transmitter sliding window is (2N -1). Receiver is not going to get frame 7 till sender get the “Ack” of frame 0 otherwise if we send all 0 to 4 and by the accident sender could not get the”Ack” of frame 0 when the timer expires frame 0 will be retransmitted and since receiver’s window is pointing to the next 0-4 frames and expecting new frame 0, is going to take it as the new frame0 which is in the wrong place. Duplicate is happened.
The diagram is providing on next page shows different steps while a window with the size of 3 frames is transmitted meanwhile frame 0 acknowledgment has lost on the way to sender.
That’s why if we have one less size for the sliding window always there is frame 4 which in the situation of lost Ack it helps the receiver to determine this is an old frame

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For simulations, we have used ns-3 simulator which is a discrete event network simulator. We have used ns-3 for evaluation of our algorithm for random sensor node deployment scenarios to find the sinks locations for a particular sensor nodes deployment.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    Any connected devise that reads the data transmitted will check the destination address; if the address does not belong to the devise, it will not read the rest of the frame. Once the intended recipient reads the frame, it will send a response to the source address; data received intact - continue, or data corrupt -…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    c. ACK: Finally, the client sends an ACK back to the server. The sequence number is set to the received acknowledgement value, and the acknowledgement number is set to one more than the received sequence number…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Management and control frames: 802.11 frames defined for some overhead function in 802.11, instead of being a data frame, which carries upper-layer information.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw310 Week6

    • 372 Words
    • 2 Pages

    5. Examine the statistics for the client node. Have the packet drops affected anything on the client that you can tell?…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab assign

    • 276 Words
    • 2 Pages

    As the client receives data does the window size get smaller, stay the same, or get bigger?…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Simple Mail Transfer Protocol. This is used to send and receive email messages between clients.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses a port within this UDP In port range to receive data packets from the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    protocol paper 1

    • 831 Words
    • 4 Pages

    Recall: In "The problem of evil," James Rachels and Stuart Rachels provider some important point: 1) Pain is not body’s warning system needed, because newborn babies did not deserve inexorable pain; 2) Even If we need evil to appreciate the good, but it is does not explain why there is such an extraordinary amount of evil in this world; 3) The doctrine of original sin was absurd. According to authors, it would be come to a conclusion that a newborn baby did deserve terrible disease. 4) The idea that Free Will Defense is in apparent contradiction to the natural evil in the world. 5) Based on the idea that a world without suffering would be void of the virtues necessary for good moral development. It does not explain the reason that God allowed the Holocaust or isolated cases of extreme cruelty to happen. 6) The theory of moral development does not explain the reason why animals suffering.…

    • 831 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Midterm Exam

    • 2086 Words
    • 9 Pages

    B. The channel of the message is faulty, or else the correct term would be sent and received.…

    • 2086 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Stage three, the message is sent and received by the receiver, and at this stage the sender should have chosen the most effective way to communicate, as well as considering who the message is for, and…

    • 1024 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In the event that a packet becomes lost due to network congestion, traffic load balancing, or other unpredictable network behavior, TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3. The third step is the when the receiver has to interpret/decode the sender 's message.…

    • 1467 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Sender: This is the source of the message which is the information that needs to be conveyed. This can be a simple message like ‘the meeting starts at four pm’ or a lengthy technical specification, for example instructions for an electronically operated window or door. The sender should use the KISS approach (Keep it simple and straight forward) because the simpler the message the more impact it will have.…

    • 2906 Words
    • 8 Pages
    Powerful Essays