SlideShare a Scribd company logo
1 of 33
Transport layer protocols:
Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) ,
Selective-Repeat Protocol , Timer , Piggybacking
Simple Protocol
• Use connectionless protocol with neither flow nor error control.
• Assume that the receiver can never be overwhelmed with incoming
packets.
• The sender sends packets one after another without even thinking
about the receiver.
Stop and Wait Protocol
• It is a connection-oriented protocol called the Stop-and-Wait protocol
• which uses both flow and error control
• The sender sends one packet at a time and waits for an acknowledgment before
sending the next one.
• To detect corrupted packets, we need to add a checksum to each data packet.
• When a packet arrives at the receiver site, it is checked. If its checksum is
incorrect, the packet is corrupted and silently discarded.
• the sender can send only one frame at a time and cannot send the next frame
without receiving the acknowledgment of the previously sent frame
Stop and Wait Protocol
• In the method, the sender waits for an acknowledgement after every frame
it sends.
• When acknowledgement is received, then only next frame is sent. The
process of alternately sending and waiting of a frame continues until the
sender transmits the EOT (End of transmission) frame.
• The sender sends a frame and waits for acknowledgment.
• Once the receiver receives the frame, it sends an acknowledgment frame
back to the sender.
• On receiving the acknowledgment frame, the sender understands that the
receiver is ready to accept the next frame. So it sender the next frame in
queue.
Sequence numbers are 0, 1,
0, 1, 0, 1, . . . ;
The acknowledgment
numbers can also be
1, 0, 1, 0, 1, 0, …
In other words,
the sequence numbers
start with 0,
the acknowledgment
numbers start with 1.
Go-Back-N Protocol (GBN)
• the multiple frames can be sent at a time.
• N is the sender's window size.
• Suppose we say that Go-Back-3, which means that the three frames
can be sent at a time before expecting the acknowledgment from the
receiver.
• If the size of the sender's window is 4 then the sequence number will
be 0,1,2,3,0,1,2,3,0,1,2, and so on.
• several data packets and acknowledgments can be in the channel at
the same time.
Working of Go-Back-N ARQ
• Suppose there are a sender and a receiver, and let's assume that there are 11
frames to be sent.
• These frames are represented as 0,1,2,3,4,5,6,7,8,9,10, and these are the
sequence numbers of the frames.
• the sequence number is decided by the sender's window size
Let's assume that the receiver has sent the acknowledgment for the 0 frame,
and the receiver has successfully received it.
The sender will then send the next frame, i.e., 4, and the window slides
containing four frames (1,2,3,4).
The receiver will then send the acknowledgment for the frame no 1.
After receiving the acknowledgment, the sender will send the next frame, i.e.,
frame no 5, and the window will slide having four frames (2,3,4,5).
Now, let's assume that the receiver is not acknowledging the frame no 2,
either the frame is lost, or the acknowledgment is lost.
Instead of sending the frame no 6, the sender Go-Back to 2, which is the first
frame of the current window, retransmits all the frames in the current
window, i.e., 2,3,4,5.
Go back N
• Receiver maintains an acknowledgement timer.
• Each time the receiver receives a new frame, it starts a new
acknowledgement timer.
• After the timer expires, receiver sends the cumulative
acknowledgement for all the frames that are unacknowledged at that
moment.
• A new acknowledgement timer does not start after the expiry of old
acknowledgement timer.
• It starts after a new frame is received.
Important points related to Go-Back-N ARQ:
• In Go-Back-N, N determines the sender's window size, and the size
of the receiver's window is always 1.
• It does not consider the corrupted frames and simply discards
them.
• It does not accept the frames which are out of order and discards
them.
• If the sender does not receive the acknowledgment, it leads to the
retransmission of all the current window frames.
Receive Window
Go-Back-N Protocol (GBN)
• This protocol improves the efficiency of stop and wait protocol by
allowing multiple frames to be transmitted before receiving an
acknowledgment.
• Both the sender and the receiver has finite sized buffers called
windows. The sender and the receiver agrees upon the number of
frames to be sent based upon the buffer size.
• The sender sends multiple frames in a sequence, without waiting for
acknowledgment.
• When its sending window is filled, it waits for acknowledgment. On
receiving acknowledgment, it advances the window and transmits
the next frames, according to the number of acknowledgments
received.
Go-Back-N versus Stop-and-Wait
• The Go-Back-N protocol simplifies the process at the receiver.
• The receiver keeps track of only one variable, and there is no need to
buffer out-of-order packets; they are simply discarded.
• this protocol is inefficient
• Each time a single packet is lost or corrupted, the sender resends all
outstanding packets
Selective-Repeat Protocol
• Selective Repeat attempts to retransmit only those packets that are
actually lost (due to errors)
• In this protocol, the size of the sender window is always equal to the
size of the receiver window.
• If the receiver receives a corrupt frame, it does not directly discard it.
• It sends a negative acknowledgment to the sender.
• The sender sends that frame again as soon as on the receiving
negative acknowledgment. There is no waiting for any time-out to
send that frame.
Timer
•Selective-Repeat uses one timer for each outstanding
packet.
•When a timer expires, only the corresponding packet is
resent.
•GBN treats outstanding packets as a group;
•SR treats them individually.
•However, most transport-layer protocols that implement
SR use only a single timer. For this reason, we use only
one timer.
Difference between the Go-Back-N ARQ and Selective Repeat ARQ?
Go-Back-N ARQ Selective Repeat ARQ
If a frame is corrupted or lost in it,
all subsequent frames have to be sent
again.
In this, only the frame is sent again, which is
corrupted or lost.
If it has a high error rate, it wastes a lot
of bandwidth.
There is a loss of low bandwidth.
It is less complex. It is more complex because it has to do sorting
and searching as well. And it also requires more
storage.
Piggybacking
• data packets flow in only one direction and acknowledgments travel
in the other direction.
• In real life, data packets are normally flowing in both directions:
from client to server and from server to client. This means that
acknowledgments also need to flow in both directions. A technique
called piggybacking
• It is used to improve the efficiency of the bidirectional protocols.
• When a packet is carrying data from A to B, it can also carry
acknowledgment feedback about arrived packets from B; when a
packet is carrying data from B to A, it can also carry acknowledgment
feedback about the arrived packets from A
• Piggybacking is a method of attaching acknowledgment to
the outgoing data packet.

More Related Content

What's hot

Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmpinki soni
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocolSTEFFY D
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionSaikrishna Tanguturu
 
Transport services
Transport servicesTransport services
Transport servicesNavin Kumar
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 

What's hot (20)

Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithm
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Data link layer
Data link layer Data link layer
Data link layer
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Transport services
Transport servicesTransport services
Transport services
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 

Similar to Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking

Similar to Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking (20)

Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Flow control main
Flow control mainFlow control main
Flow control main
 
Go back.pptx
Go back.pptxGo back.pptx
Go back.pptx
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
 
Flow Control.pptx
Flow Control.pptxFlow Control.pptx
Flow Control.pptx
 
Protocols
ProtocolsProtocols
Protocols
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptx
 
Flowctrl
FlowctrlFlowctrl
Flowctrl
 
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptsession -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
 

More from Kongu Engineering College, Perundurai, Erode

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Introduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdfIntroduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdf
 
Dropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdfDropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdf
 
div tag.pdf
div tag.pdfdiv tag.pdf
div tag.pdf
 
Dimensions of elements.pdf
Dimensions of elements.pdfDimensions of elements.pdf
Dimensions of elements.pdf
 
CSS Positioning Elements.pdf
CSS Positioning Elements.pdfCSS Positioning Elements.pdf
CSS Positioning Elements.pdf
 
Random number generation_upload.pdf
Random number generation_upload.pdfRandom number generation_upload.pdf
Random number generation_upload.pdf
 
JavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdfJavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdf
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking

  • 1. Transport layer protocols: Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
  • 2. Simple Protocol • Use connectionless protocol with neither flow nor error control. • Assume that the receiver can never be overwhelmed with incoming packets. • The sender sends packets one after another without even thinking about the receiver.
  • 3.
  • 4. Stop and Wait Protocol • It is a connection-oriented protocol called the Stop-and-Wait protocol • which uses both flow and error control • The sender sends one packet at a time and waits for an acknowledgment before sending the next one. • To detect corrupted packets, we need to add a checksum to each data packet. • When a packet arrives at the receiver site, it is checked. If its checksum is incorrect, the packet is corrupted and silently discarded. • the sender can send only one frame at a time and cannot send the next frame without receiving the acknowledgment of the previously sent frame
  • 5. Stop and Wait Protocol • In the method, the sender waits for an acknowledgement after every frame it sends. • When acknowledgement is received, then only next frame is sent. The process of alternately sending and waiting of a frame continues until the sender transmits the EOT (End of transmission) frame. • The sender sends a frame and waits for acknowledgment. • Once the receiver receives the frame, it sends an acknowledgment frame back to the sender. • On receiving the acknowledgment frame, the sender understands that the receiver is ready to accept the next frame. So it sender the next frame in queue.
  • 6. Sequence numbers are 0, 1, 0, 1, 0, 1, . . . ; The acknowledgment numbers can also be 1, 0, 1, 0, 1, 0, … In other words, the sequence numbers start with 0, the acknowledgment numbers start with 1.
  • 7.
  • 8.
  • 9.
  • 10. Go-Back-N Protocol (GBN) • the multiple frames can be sent at a time. • N is the sender's window size. • Suppose we say that Go-Back-3, which means that the three frames can be sent at a time before expecting the acknowledgment from the receiver. • If the size of the sender's window is 4 then the sequence number will be 0,1,2,3,0,1,2,3,0,1,2, and so on. • several data packets and acknowledgments can be in the channel at the same time.
  • 11. Working of Go-Back-N ARQ • Suppose there are a sender and a receiver, and let's assume that there are 11 frames to be sent. • These frames are represented as 0,1,2,3,4,5,6,7,8,9,10, and these are the sequence numbers of the frames. • the sequence number is decided by the sender's window size
  • 12. Let's assume that the receiver has sent the acknowledgment for the 0 frame, and the receiver has successfully received it.
  • 13. The sender will then send the next frame, i.e., 4, and the window slides containing four frames (1,2,3,4).
  • 14. The receiver will then send the acknowledgment for the frame no 1. After receiving the acknowledgment, the sender will send the next frame, i.e., frame no 5, and the window will slide having four frames (2,3,4,5).
  • 15. Now, let's assume that the receiver is not acknowledging the frame no 2, either the frame is lost, or the acknowledgment is lost. Instead of sending the frame no 6, the sender Go-Back to 2, which is the first frame of the current window, retransmits all the frames in the current window, i.e., 2,3,4,5.
  • 16.
  • 17. Go back N • Receiver maintains an acknowledgement timer. • Each time the receiver receives a new frame, it starts a new acknowledgement timer. • After the timer expires, receiver sends the cumulative acknowledgement for all the frames that are unacknowledged at that moment. • A new acknowledgement timer does not start after the expiry of old acknowledgement timer. • It starts after a new frame is received.
  • 18. Important points related to Go-Back-N ARQ: • In Go-Back-N, N determines the sender's window size, and the size of the receiver's window is always 1. • It does not consider the corrupted frames and simply discards them. • It does not accept the frames which are out of order and discards them. • If the sender does not receive the acknowledgment, it leads to the retransmission of all the current window frames.
  • 19.
  • 20.
  • 22. Go-Back-N Protocol (GBN) • This protocol improves the efficiency of stop and wait protocol by allowing multiple frames to be transmitted before receiving an acknowledgment. • Both the sender and the receiver has finite sized buffers called windows. The sender and the receiver agrees upon the number of frames to be sent based upon the buffer size. • The sender sends multiple frames in a sequence, without waiting for acknowledgment. • When its sending window is filled, it waits for acknowledgment. On receiving acknowledgment, it advances the window and transmits the next frames, according to the number of acknowledgments received.
  • 23.
  • 24.
  • 25.
  • 26. Go-Back-N versus Stop-and-Wait • The Go-Back-N protocol simplifies the process at the receiver. • The receiver keeps track of only one variable, and there is no need to buffer out-of-order packets; they are simply discarded. • this protocol is inefficient • Each time a single packet is lost or corrupted, the sender resends all outstanding packets
  • 27. Selective-Repeat Protocol • Selective Repeat attempts to retransmit only those packets that are actually lost (due to errors) • In this protocol, the size of the sender window is always equal to the size of the receiver window. • If the receiver receives a corrupt frame, it does not directly discard it. • It sends a negative acknowledgment to the sender. • The sender sends that frame again as soon as on the receiving negative acknowledgment. There is no waiting for any time-out to send that frame.
  • 28.
  • 29. Timer •Selective-Repeat uses one timer for each outstanding packet. •When a timer expires, only the corresponding packet is resent. •GBN treats outstanding packets as a group; •SR treats them individually. •However, most transport-layer protocols that implement SR use only a single timer. For this reason, we use only one timer.
  • 30.
  • 31. Difference between the Go-Back-N ARQ and Selective Repeat ARQ? Go-Back-N ARQ Selective Repeat ARQ If a frame is corrupted or lost in it, all subsequent frames have to be sent again. In this, only the frame is sent again, which is corrupted or lost. If it has a high error rate, it wastes a lot of bandwidth. There is a loss of low bandwidth. It is less complex. It is more complex because it has to do sorting and searching as well. And it also requires more storage.
  • 32. Piggybacking • data packets flow in only one direction and acknowledgments travel in the other direction. • In real life, data packets are normally flowing in both directions: from client to server and from server to client. This means that acknowledgments also need to flow in both directions. A technique called piggybacking • It is used to improve the efficiency of the bidirectional protocols. • When a packet is carrying data from A to B, it can also carry acknowledgment feedback about arrived packets from B; when a packet is carrying data from B to A, it can also carry acknowledgment feedback about the arrived packets from A
  • 33. • Piggybacking is a method of attaching acknowledgment to the outgoing data packet.