SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 505
IMPORTANCE OF SLIDING WINDOW PROTOCOL
Balwinder Kaur1
, Mandeep Kaur2
, Pooja Mudgil3
, Harjeet Singh4
1, 2
Assistant Professor, Computer Science Department, CT Institute of Technology, Punjab, India,
engineer.balwinder@yahoo.in, mandeepquiet@gmail.com
3
Assistant Professor, Computer Science Department, Bhagwan Parshuram Institute of Technology, Delhi, India,
engineer.pooja90@gmail.com
4
Assistant Professor, Computer Science Department, Lovely Professional University, Punjab, India
harjit1985@googlemail.com
Abstract
The data can get lost, reordered or duplicated due to the presence of routers and buffer space over the unreliable channel in the
conventional networks. The data link layer deals with frame formation, flow control, error control, and addressing and link
management. All such functions will be performed only by data link protocols. The sliding window protocol will detect and correct
error if the received data have enough redundant bits or repeat a retransmission of data. The paper shows the working of this duplex
protocol of data link network.
Keywords: ACK, GOBACK, ARQ, NACK.
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
The physical layer deal with transmission signal over different
media Data link layer deals with frame formation and flow
control, error control over unreliable channels of conventional
channel various data limitations cause efficiency decrease.
Generally there are two approaches to control such errors:
a) Forward Error Correction (FEC)
In this the sender adds redundant data to its message known as
error-correcting code. This enables the receiver to detect and
correct error without repeating additional data from the sender.
In this, the back channel is not required and retransmission of
data can often be avoided, so it is used where retransmission is
either costly or impossible. The FEC systems are designed for
simplex channels.
(b) Automatic Repeat Request (ARQ)
It uses the high rate error-detecting code together with some
retransmission protocol. When the error is detected by receiver
it generates negative feedback and gives positive feedback for
the no error. So this scheme requires a feedback channel.
Similarly the flow control will control, the rate of frame
transmission to a value, which can be handled by the receiver.
It requires some kind of feedback mechanism. The two basic
techniques to achieve flow control accesses data
communication links are
a. Stop and wait
b. Sidling window
So In the present paper we will discuss the error correction
and flow control function in relation to sliding window. The
remaining paper is organized with next section of sliding
window overview, significance of senders and receivers
windows. A bit sliding window protocol (stop and wait
ARQ),a protocol using Go Back n ,Selective repeat ARQ,
Piggybacking and throughout efficiency.
2. SLIDING WINDOW PROTOCOLS
This shows a different performance in terms of their
efficiency, complexity and buffer requirement. Sliding
window protocol assumes full duplex communication. It uses
two types of frames, first data and second acknowledgment.
One of important features of all the sliding windows protocol
is that each outbound frame contains a sequence number,
ranging from 0 to 2n
-1, where the value of n can be arbitrary.
Sliding window refers to imaginary boxes at the transmitter
and receiver. This window provides the upper limit on the
number of frames that can be transmitted before
acknowledgment requirement. Window holds the number of
frame to provide above mention limit. The frames which are
being transmitted to send are falling in sending window
similarly frames to be accepted are store in the receiving
window.
This sliding window protocol is widely used in
communication. Protocol such as TCP,HDLC and SPX .The
poor quality communication channels where the data probably
will get duplicated, last or reorder, can provide efficient data
transfer with high complexity. This protocol is establishing
protocol in ISO-051 Protocol stack.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 506
2.1 Significance of Sender's and Receiver's Windows:
Both the senders and receivers windows are needed not to be
of same size. The input sequence obtained from sending host
are required to be transmitted via an unreliable network, they
must be delivered on the receiving host on the same order in
which they appear in the input sequence. So that the
correctness condition for sliding window protocol is satisfied.
Fig.1 Sliding Windows
The sequence no. within the sender’s window gives the
number of frame sent but not yet acknowledge. The frames in
the sender’s window are stored so that they can be possibly
retransmitted in the case of damage while travelling to
receiver.
The receiver window represents not the number of frame
receive but the no. of frame that may still be received before
an ACK is sent. Because sliding window of receiver strings
from left when frame of data are received and expand to right
when ACK is sent. The receiver window contains (n-1) spaces
for frame.
2.2 A One Bit Sliding Window Protocol (Stop and
Wait ARQ):
In this case n=1 and uses stop and wait technique. Sender
waits for ACK after each frame transmission. The operation of
this protocol is based on the ARQ(automatic repeat request)
principle, which hold the next frame will be transmitted when
positive ACK is received and when negative ACK is received,
it retransmit the same frame.
Stop and wait ARQ becomes inefficient when the propagation
delay is much greater than the time tool retransmit for
example let us assume that frame of 800 bits is transmitted
over channel with speed 1mbps and let time for transmission if
from end ACK is 30 ms. The number of bits that can be
transmitted over this channel is 30,000 bits.
But in stop and wait ARQ only 800 bits can be transmitted as
it waits for ACK. The product of bit rate and delay is called
delay bandwidth product. It helps in measuring last
opportunity in transmitted bits.
2.3 A Protocol Using Go Back n:
The sender in this case does not waits for the ACK signal for
transmission of next frame. The sender continuously transmits
the frame so that the channel should be kept busy rather that
wasting time in waiting for it ACK. Because in stop and
protocol system does not transmit anything while it is waiting
So channel remain idle for considerable time period But in this
case the system does depends on only NACK(negative
feedback). It symbolizes error in a particular frame. But as
NACK signal will take same time to reach sender, the sender
will continue to transmit. On the reception of the NACK
signal, the transmitter will retransmit all the frames 3 onwards.
The receivers discard all the frames it has received after 3.
Example: suppose the frame is being transmitted end at frame
bit 3 error occurs and NACK is transmitted at the receiver. But
this takes some time to reach the transmitter. By the time upto
frame 7 has all ways been transmitted.
If the transmitter frame is lost or acknowledgement is lost then
only error occurs. In case of damaged or lost frames the
receiver transmits NACK to transmitter and the transmitter
retransmits all the frames sent since the last frame
acknowledged. The disadvantage of go back ARQ protocol is
that its efficiency decreases in noisy channel as it does not
wait for ACK after every frame transmitted.
3. PIGGY BACKING
MOST of the real time systems the data transmission needs to
be bi-directional which is popularly called as full duplex
system. Now this two way transmission can be achieved in
two ways:
a) The method in which two separate channels are involved
for both forward and reversed transfer. But in this case
acknowledgement are involved which waste the bandwidth of
the reverse entirely. This whole system is the basis of the
sliding window protocol.
b) But there is a better solution to achieve full duplexing with
same capacity channels for both ways (forward and reversed)
transmission. In this technique, suppose two A and B users
transmits data frame then data frames from A and B is
intermixed with ACK and from B to A. when the receivers
receives the data frame it does not transfer ACK signal
immediately but wait until the network layer of receiver
moves to next data packet then ACK is attached to this
outgoing data packet to be transmitted to A. this technique in
which the acknowledgement is delayed temporarily is called
piggy backing. Though it provides additional complexity but
involves better use of channel bandwidth. The only thing we
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 507
have to consider is that data link layer may take too long to
transmit.
3.1 Improvement of the Throughput Efficiency:
If the delays remain unchanged the throughput efficiency will
decrease. So to compensate this it will be necessary to use
longer blocks for higher data rates. But it must be kept in mind
that the longer blocks will have a greater probability of error.
So the optimum block length is must for any particular system
so throughput efficiency depends upon the type of system
used.
The half duplex system have poor efficiency which can be
increased by adapting the continuous mode of transmission
instead of block by block transmission. This system will avoid
dead time but needs more storage or buffering.
4. SIMPLE PROCEDURE OF SLIDING WINDOW
COMMUNICATION:
• In the beginning the sending window and the
receiving window are empty.
• Sender start sending data frames and receiver waits
for frames from network.
• Whenever sender gets new packet from network layer
the next higher sequence number according to
sending window is given and the upper edge is
advanced by one.
• After transmitting one frame and starting the timer,
the sender will transmit next data until sending
window is filled.
• in mean time sender wait for ACK.
If active ACK is received then sender
fetches next packet and overwrite the
previous packet on buffer.
If damaged ACK or timer goes off then
duplicate should be sent.
• When a valid frame arrives, its sequence number is
checked to see if it is the next one. If it the next one
then it is accepted and passed to network layer and
ACK will be generated.
• But if it does not happen so then it will be discarded
and is not passed to network layer.
CONCLUSIONS
In the above paper the brief discussion of the sliding window
protocols and associated systems is given. We can develop a
general overview easily from the research paper which
together has information poured from various sources and
persons. We can analyze the advantage and disadvantage of
various data link protocols included in the sliding window
protocol. We can easily build up concise that computer
network will be useless without sliding window protocol
because without it , network transmit data over channels that
often lose, duplicate or reorder messages.
REFERENCES
[1]. A.S. Tanenbaum. Computer Networks Prentice-Hall
International, Inc., 1996.
[2]. Analysis of sliding window protocol for connected node
volume-2, Issue-5, November 2012
[3].N.V. Stenning. A data transfer protocol. Computer
Networks, 1(2):99–110, 1976. Eric Madelaine and Didier
Vergamini. Specification and Verification of a Sliding
Window Protocol in LOTOS FORTE '91, Sydney, Australia, ,
pages 495-510 November 1991
[4]. Mark A. Smith and Nils Klarlund. Verification of a
Sliding Window Protocol Using IOA and MONA
FORTE/PSTV 2000, Pisa, Italy, pages 19-34, October 2000.

More Related Content

What's hot

Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocolRishu Seth
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eadpeer
 
Simplex stop and_wait_protocol
Simplex stop and_wait_protocolSimplex stop and_wait_protocol
Simplex stop and_wait_protocolMusfira Ameer
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocolSTEFFY D
 
Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Muhammad Irtiza
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error controlAdil Mehmoood
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiselessBasit Hussain
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control ProtocolsTechiNerd
 

What's hot (20)

Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
Simplex stop and_wait_protocol
Simplex stop and_wait_protocolSimplex stop and_wait_protocol
Simplex stop and_wait_protocol
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Flow control
Flow controlFlow control
Flow control
 
6 data linkcontrol
6  data linkcontrol6  data linkcontrol
6 data linkcontrol
 
Ch 11
Ch 11Ch 11
Ch 11
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Stop And Wait ARQ
Stop And Wait ARQStop And Wait ARQ
Stop And Wait ARQ
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error control
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiseless
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
 

Viewers also liked

Behaviour of concrete beams reinforced with glass
Behaviour of concrete beams reinforced with glassBehaviour of concrete beams reinforced with glass
Behaviour of concrete beams reinforced with glasseSAT Publishing House
 
Applications of matlab in optimization of bridge
Applications of matlab in optimization of bridgeApplications of matlab in optimization of bridge
Applications of matlab in optimization of bridgeeSAT Publishing House
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyeSAT Publishing House
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencleSAT Publishing House
 
Cloud storage limit monitoring measures
Cloud storage limit monitoring measuresCloud storage limit monitoring measures
Cloud storage limit monitoring measureseSAT Publishing House
 
Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...eSAT Publishing House
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniqueseSAT Publishing House
 
Development and performance evaluation of
Development and performance evaluation ofDevelopment and performance evaluation of
Development and performance evaluation ofeSAT Publishing House
 
Computational model to design circular runner
Computational model to design circular runnerComputational model to design circular runner
Computational model to design circular runnereSAT Publishing House
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...eSAT Publishing House
 
A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...eSAT Publishing House
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...eSAT Publishing House
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Publishing House
 
Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...eSAT Publishing House
 
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...eSAT Publishing House
 
Performance investigation of a flat plate collector
Performance investigation of a flat plate collectorPerformance investigation of a flat plate collector
Performance investigation of a flat plate collectoreSAT Publishing House
 
An overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetsAn overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetseSAT Publishing House
 
Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...eSAT Publishing House
 

Viewers also liked (20)

Behaviour of concrete beams reinforced with glass
Behaviour of concrete beams reinforced with glassBehaviour of concrete beams reinforced with glass
Behaviour of concrete beams reinforced with glass
 
Applications of matlab in optimization of bridge
Applications of matlab in optimization of bridgeApplications of matlab in optimization of bridge
Applications of matlab in optimization of bridge
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case study
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencl
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
 
Cloud storage limit monitoring measures
Cloud storage limit monitoring measuresCloud storage limit monitoring measures
Cloud storage limit monitoring measures
 
Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Development and performance evaluation of
Development and performance evaluation ofDevelopment and performance evaluation of
Development and performance evaluation of
 
Computational model to design circular runner
Computational model to design circular runnerComputational model to design circular runner
Computational model to design circular runner
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...
 
A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...
 
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
 
Performance investigation of a flat plate collector
Performance investigation of a flat plate collectorPerformance investigation of a flat plate collector
Performance investigation of a flat plate collector
 
An overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetsAn overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasets
 
Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...
 

Similar to Importance of sliding window protocol

Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryeSAT Journals
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Journals
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.pptShaliniKumariGupta1
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layereSAT Publishing House
 
Automatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) ProtocolsAutomatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) Protocolstheijes
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
IRJET- QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...
IRJET-  	  QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...IRJET-  	  QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...
IRJET- QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...IRJET Journal
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networkseSAT Publishing House
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 

Similar to Importance of sliding window protocol (20)

Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetry
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 
Transport layer
Transport layerTransport layer
Transport layer
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layer
 
Automatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) ProtocolsAutomatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) Protocols
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Ijetcas14 572
Ijetcas14 572Ijetcas14 572
Ijetcas14 572
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
IRJET- QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...
IRJET-  	  QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...IRJET-  	  QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...
IRJET- QOS Based Bandwidth Satisfaction for Multicast Network Coding in M...
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
A018120105
A018120105A018120105
A018120105
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
 
Data link layer (Unit 2).pdf
Data link layer (Unit 2).pdfData link layer (Unit 2).pdf
Data link layer (Unit 2).pdf
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networks
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Importance of sliding window protocol

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 505 IMPORTANCE OF SLIDING WINDOW PROTOCOL Balwinder Kaur1 , Mandeep Kaur2 , Pooja Mudgil3 , Harjeet Singh4 1, 2 Assistant Professor, Computer Science Department, CT Institute of Technology, Punjab, India, engineer.balwinder@yahoo.in, mandeepquiet@gmail.com 3 Assistant Professor, Computer Science Department, Bhagwan Parshuram Institute of Technology, Delhi, India, engineer.pooja90@gmail.com 4 Assistant Professor, Computer Science Department, Lovely Professional University, Punjab, India harjit1985@googlemail.com Abstract The data can get lost, reordered or duplicated due to the presence of routers and buffer space over the unreliable channel in the conventional networks. The data link layer deals with frame formation, flow control, error control, and addressing and link management. All such functions will be performed only by data link protocols. The sliding window protocol will detect and correct error if the received data have enough redundant bits or repeat a retransmission of data. The paper shows the working of this duplex protocol of data link network. Keywords: ACK, GOBACK, ARQ, NACK. ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION The physical layer deal with transmission signal over different media Data link layer deals with frame formation and flow control, error control over unreliable channels of conventional channel various data limitations cause efficiency decrease. Generally there are two approaches to control such errors: a) Forward Error Correction (FEC) In this the sender adds redundant data to its message known as error-correcting code. This enables the receiver to detect and correct error without repeating additional data from the sender. In this, the back channel is not required and retransmission of data can often be avoided, so it is used where retransmission is either costly or impossible. The FEC systems are designed for simplex channels. (b) Automatic Repeat Request (ARQ) It uses the high rate error-detecting code together with some retransmission protocol. When the error is detected by receiver it generates negative feedback and gives positive feedback for the no error. So this scheme requires a feedback channel. Similarly the flow control will control, the rate of frame transmission to a value, which can be handled by the receiver. It requires some kind of feedback mechanism. The two basic techniques to achieve flow control accesses data communication links are a. Stop and wait b. Sidling window So In the present paper we will discuss the error correction and flow control function in relation to sliding window. The remaining paper is organized with next section of sliding window overview, significance of senders and receivers windows. A bit sliding window protocol (stop and wait ARQ),a protocol using Go Back n ,Selective repeat ARQ, Piggybacking and throughout efficiency. 2. SLIDING WINDOW PROTOCOLS This shows a different performance in terms of their efficiency, complexity and buffer requirement. Sliding window protocol assumes full duplex communication. It uses two types of frames, first data and second acknowledgment. One of important features of all the sliding windows protocol is that each outbound frame contains a sequence number, ranging from 0 to 2n -1, where the value of n can be arbitrary. Sliding window refers to imaginary boxes at the transmitter and receiver. This window provides the upper limit on the number of frames that can be transmitted before acknowledgment requirement. Window holds the number of frame to provide above mention limit. The frames which are being transmitted to send are falling in sending window similarly frames to be accepted are store in the receiving window. This sliding window protocol is widely used in communication. Protocol such as TCP,HDLC and SPX .The poor quality communication channels where the data probably will get duplicated, last or reorder, can provide efficient data transfer with high complexity. This protocol is establishing protocol in ISO-051 Protocol stack.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 506 2.1 Significance of Sender's and Receiver's Windows: Both the senders and receivers windows are needed not to be of same size. The input sequence obtained from sending host are required to be transmitted via an unreliable network, they must be delivered on the receiving host on the same order in which they appear in the input sequence. So that the correctness condition for sliding window protocol is satisfied. Fig.1 Sliding Windows The sequence no. within the sender’s window gives the number of frame sent but not yet acknowledge. The frames in the sender’s window are stored so that they can be possibly retransmitted in the case of damage while travelling to receiver. The receiver window represents not the number of frame receive but the no. of frame that may still be received before an ACK is sent. Because sliding window of receiver strings from left when frame of data are received and expand to right when ACK is sent. The receiver window contains (n-1) spaces for frame. 2.2 A One Bit Sliding Window Protocol (Stop and Wait ARQ): In this case n=1 and uses stop and wait technique. Sender waits for ACK after each frame transmission. The operation of this protocol is based on the ARQ(automatic repeat request) principle, which hold the next frame will be transmitted when positive ACK is received and when negative ACK is received, it retransmit the same frame. Stop and wait ARQ becomes inefficient when the propagation delay is much greater than the time tool retransmit for example let us assume that frame of 800 bits is transmitted over channel with speed 1mbps and let time for transmission if from end ACK is 30 ms. The number of bits that can be transmitted over this channel is 30,000 bits. But in stop and wait ARQ only 800 bits can be transmitted as it waits for ACK. The product of bit rate and delay is called delay bandwidth product. It helps in measuring last opportunity in transmitted bits. 2.3 A Protocol Using Go Back n: The sender in this case does not waits for the ACK signal for transmission of next frame. The sender continuously transmits the frame so that the channel should be kept busy rather that wasting time in waiting for it ACK. Because in stop and protocol system does not transmit anything while it is waiting So channel remain idle for considerable time period But in this case the system does depends on only NACK(negative feedback). It symbolizes error in a particular frame. But as NACK signal will take same time to reach sender, the sender will continue to transmit. On the reception of the NACK signal, the transmitter will retransmit all the frames 3 onwards. The receivers discard all the frames it has received after 3. Example: suppose the frame is being transmitted end at frame bit 3 error occurs and NACK is transmitted at the receiver. But this takes some time to reach the transmitter. By the time upto frame 7 has all ways been transmitted. If the transmitter frame is lost or acknowledgement is lost then only error occurs. In case of damaged or lost frames the receiver transmits NACK to transmitter and the transmitter retransmits all the frames sent since the last frame acknowledged. The disadvantage of go back ARQ protocol is that its efficiency decreases in noisy channel as it does not wait for ACK after every frame transmitted. 3. PIGGY BACKING MOST of the real time systems the data transmission needs to be bi-directional which is popularly called as full duplex system. Now this two way transmission can be achieved in two ways: a) The method in which two separate channels are involved for both forward and reversed transfer. But in this case acknowledgement are involved which waste the bandwidth of the reverse entirely. This whole system is the basis of the sliding window protocol. b) But there is a better solution to achieve full duplexing with same capacity channels for both ways (forward and reversed) transmission. In this technique, suppose two A and B users transmits data frame then data frames from A and B is intermixed with ACK and from B to A. when the receivers receives the data frame it does not transfer ACK signal immediately but wait until the network layer of receiver moves to next data packet then ACK is attached to this outgoing data packet to be transmitted to A. this technique in which the acknowledgement is delayed temporarily is called piggy backing. Though it provides additional complexity but involves better use of channel bandwidth. The only thing we
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 507 have to consider is that data link layer may take too long to transmit. 3.1 Improvement of the Throughput Efficiency: If the delays remain unchanged the throughput efficiency will decrease. So to compensate this it will be necessary to use longer blocks for higher data rates. But it must be kept in mind that the longer blocks will have a greater probability of error. So the optimum block length is must for any particular system so throughput efficiency depends upon the type of system used. The half duplex system have poor efficiency which can be increased by adapting the continuous mode of transmission instead of block by block transmission. This system will avoid dead time but needs more storage or buffering. 4. SIMPLE PROCEDURE OF SLIDING WINDOW COMMUNICATION: • In the beginning the sending window and the receiving window are empty. • Sender start sending data frames and receiver waits for frames from network. • Whenever sender gets new packet from network layer the next higher sequence number according to sending window is given and the upper edge is advanced by one. • After transmitting one frame and starting the timer, the sender will transmit next data until sending window is filled. • in mean time sender wait for ACK. If active ACK is received then sender fetches next packet and overwrite the previous packet on buffer. If damaged ACK or timer goes off then duplicate should be sent. • When a valid frame arrives, its sequence number is checked to see if it is the next one. If it the next one then it is accepted and passed to network layer and ACK will be generated. • But if it does not happen so then it will be discarded and is not passed to network layer. CONCLUSIONS In the above paper the brief discussion of the sliding window protocols and associated systems is given. We can develop a general overview easily from the research paper which together has information poured from various sources and persons. We can analyze the advantage and disadvantage of various data link protocols included in the sliding window protocol. We can easily build up concise that computer network will be useless without sliding window protocol because without it , network transmit data over channels that often lose, duplicate or reorder messages. REFERENCES [1]. A.S. Tanenbaum. Computer Networks Prentice-Hall International, Inc., 1996. [2]. Analysis of sliding window protocol for connected node volume-2, Issue-5, November 2012 [3].N.V. Stenning. A data transfer protocol. Computer Networks, 1(2):99–110, 1976. Eric Madelaine and Didier Vergamini. Specification and Verification of a Sliding Window Protocol in LOTOS FORTE '91, Sydney, Australia, , pages 495-510 November 1991 [4]. Mark A. Smith and Nils Klarlund. Verification of a Sliding Window Protocol Using IOA and MONA FORTE/PSTV 2000, Pisa, Italy, pages 19-34, October 2000.