This document discusses reliable transmission using the OSI model and Automatic Repeat Request (ARQ) protocols. It describes the concepts of acknowledgements, timeouts, and sequence numbers used by ARQ protocols to recover from lost or corrupted frames. Specifically, it explains the Stop-and-Wait and Go-Back-N ARQ protocols, including how they use sliding windows and cumulative acknowledgements.
constrained application protocol(CoAP) is a specialized web transfer protocol for use with constrained networks in internet of things and constrained devices such as microcontrollers.
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
S.VIJAYALAKSHMI M.SC(CS) discusses Media Access Control and multiple access protocols. The main task of MAC protocols is to minimize collisions and utilize bandwidth by determining when nodes can access the shared channel, what to do when the channel is busy, and how to handle collisions. Early protocols like Aloha and slotted Aloha were inefficient at high loads due to many collisions. CSMA protocols reduce collisions by having nodes listen first before transmitting, but collisions are still possible due to propagation delays.
The document discusses two main distributed document-based systems: the World Wide Web and Lotus Notes. For the World Wide Web, it describes how documents are represented and accessed via HTTP, how servers are clustered for performance and availability, and how caching and content delivery networks improve performance. For Lotus Notes, it outlines how notes are organized in databases and replicated across servers for availability, and how conflicts during replication are resolved. Both systems use security mechanisms like TLS/SSL and public-key cryptography.
This document discusses multiple access protocols used to coordinate access to shared broadcast channels. It describes various channel partitioning protocols like TDMA and FDMA that divide channels by time or frequency. Random access protocols like ALOHA and CSMA are also covered, which allow nodes to transmit randomly and detect collisions. CSMA/CD improves on CSMA by allowing nodes to detect collisions quickly and abort transmissions. Taking-turns protocols pass control of the channel between nodes either through polling or token passing. The document provides examples and compares the efficiency of different multiple access protocols.
Fault tolerance is important for distributed systems to continue functioning in the event of partial failures. There are several phases to achieving fault tolerance: fault detection, diagnosis, evidence generation, assessment, and recovery. Common techniques include replication, where multiple copies of data are stored at different sites to increase availability if one site fails, and check pointing, where a system's state is periodically saved to stable storage so the system can be restored to a previous consistent state if a failure occurs. Both techniques have limitations around managing consistency with replication and overhead from checkpointing communications and storage requirements.
HDLC is a bit-oriented protocol defined by ISO for point-to-point and multipoint communication over data links. It supports full-duplex communication and provides reliability, efficiency and flexibility. HDLC defines three types of stations - primary, secondary and combined. It uses three frame types - unnumbered, information and supervisory frames. HDLC also specifies three data transfer modes - normal response mode, asynchronous response mode and asynchronous balanced mode. [/SUMMARY]
constrained application protocol(CoAP) is a specialized web transfer protocol for use with constrained networks in internet of things and constrained devices such as microcontrollers.
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
S.VIJAYALAKSHMI M.SC(CS) discusses Media Access Control and multiple access protocols. The main task of MAC protocols is to minimize collisions and utilize bandwidth by determining when nodes can access the shared channel, what to do when the channel is busy, and how to handle collisions. Early protocols like Aloha and slotted Aloha were inefficient at high loads due to many collisions. CSMA protocols reduce collisions by having nodes listen first before transmitting, but collisions are still possible due to propagation delays.
The document discusses two main distributed document-based systems: the World Wide Web and Lotus Notes. For the World Wide Web, it describes how documents are represented and accessed via HTTP, how servers are clustered for performance and availability, and how caching and content delivery networks improve performance. For Lotus Notes, it outlines how notes are organized in databases and replicated across servers for availability, and how conflicts during replication are resolved. Both systems use security mechanisms like TLS/SSL and public-key cryptography.
This document discusses multiple access protocols used to coordinate access to shared broadcast channels. It describes various channel partitioning protocols like TDMA and FDMA that divide channels by time or frequency. Random access protocols like ALOHA and CSMA are also covered, which allow nodes to transmit randomly and detect collisions. CSMA/CD improves on CSMA by allowing nodes to detect collisions quickly and abort transmissions. Taking-turns protocols pass control of the channel between nodes either through polling or token passing. The document provides examples and compares the efficiency of different multiple access protocols.
Fault tolerance is important for distributed systems to continue functioning in the event of partial failures. There are several phases to achieving fault tolerance: fault detection, diagnosis, evidence generation, assessment, and recovery. Common techniques include replication, where multiple copies of data are stored at different sites to increase availability if one site fails, and check pointing, where a system's state is periodically saved to stable storage so the system can be restored to a previous consistent state if a failure occurs. Both techniques have limitations around managing consistency with replication and overhead from checkpointing communications and storage requirements.
HDLC is a bit-oriented protocol defined by ISO for point-to-point and multipoint communication over data links. It supports full-duplex communication and provides reliability, efficiency and flexibility. HDLC defines three types of stations - primary, secondary and combined. It uses three frame types - unnumbered, information and supervisory frames. HDLC also specifies three data transfer modes - normal response mode, asynchronous response mode and asynchronous balanced mode. [/SUMMARY]
The document discusses various consistency models including strict consistency, sequential consistency, causal consistency, pipelined random access memory consistency, processor consistency, and weak consistency. It focuses on explaining the sequential consistency model, which requires that all processes in the system see the memory operations in the same order, and allows different interleavings of read and write operations as long as this requirement is met. The document also discusses different strategies for implementing sequential consistency in distributed shared memory systems, including nonreplicated nonmigrating blocks, nonreplicated migrating blocks, replicated migrating blocks, and replicated nonmigrating blocks.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
This is the bottom sublayer of the Data Link Layer. This Chapter is especially relevant for LANs.
4.1 The Channel Allocation Problem
How to allocate a single channel among multiple users.
4.2 Multiple Access Protocols
How to handle contention for the use of a channel.
4.3 IEEE Standards for LANs
How do the protocols of the last sections apply to real systems. Here we talk about the actual standards in use.
4.4 Bridges
Ways of connecting networks together.
4.5 High Speed LANs
Directions in high speed networks.
WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
This presentation discusses quality of service (QoS) in data communication networks. It defines QoS as the ability of a network to provide better service to some data flows over others. The document outlines key QoS parameters like flow data transfer rates and transmission delays. It also describes flow characteristics such as reliability, delay, jitter, and bandwidth requirements. The presentation then covers techniques for improving QoS, including scheduling methods like priority queuing and traffic shaping using leaky bucket mechanisms. It discusses reserving network resources to ensure QoS and controlling admission of packets. Finally, the document lists some important applications of QoS in mobile communication, real-time media, interactive apps, and ATM networks.
This document discusses various approaches to improving TCP performance over mobile networks. It describes Indirect TCP, Snooping TCP, Mobile TCP, optimizations like fast retransmit/recovery and transmission freezing, and transaction-oriented TCP. Each approach is summarized in terms of its key mechanisms, advantages, and disadvantages. Overall, the document evaluates different ways TCP has been adapted to better support mobility and address challenges like frequent disconnections, packet losses during handovers, and high bit error rates over wireless links.
The document discusses the ALOHA protocol for medium access. It was developed at the University of Hawaii in 1971 to connect users across the Hawaiian islands via radio frequencies. There are two main versions: Pure ALOHA, where nodes transmit randomly, and Slotted ALOHA, where time is divided into slots for transmission. Slotted ALOHA improves on Pure ALOHA by reducing collisions to only those within a time slot. The maximum throughput for Pure ALOHA is 18.4% while Slotted ALOHA achieves 37%, but both protocols experience exponentially decreasing performance with only small increases in network load.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Congestion control, slow start, fast retransmit rajisri2
This document discusses TCP congestion control algorithms including slow start and fast retransmit. It provides overview and explanations of how these algorithms work to control congestion in a network. Slow start gradually increases data transmission to find the network's maximum capacity without overloading it. Fast retransmit allows retransmission of lost packets upon receiving three duplicate ACKs without waiting for timers, improving efficiency. These algorithms help prevent network congestion and allow for faster data transmission.
The document discusses information theory and source coding. It defines information and entropy, explaining that the amount of information contained in a message depends on its probability. The entropy of a data source measures the average information content. Huffman coding is presented as a method to assign variable-length codes to symbols to minimize the average code length. Error detection and correction codes are also summarized, including parity checking, cyclic redundancy checks (CRC), linear block codes, and convolutional codes.
SSH is a protocol for secure remote access to a machine over untrusted networks.
SSH is a replacement for telnet, rsh, rlogin and can replace ftp.
Uses Encryption.
SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter)
PGP (Pretty Good Privacy) is an open source encryption software that provides security mechanisms like authentication, confidentiality, compression, and email compatibility. It uses strong cryptographic algorithms like IDEA, RSA, and SHA-1. PGP protects messages by signing them with the sender's private key, encrypting them with a random symmetric key, and encrypting that key with the recipient's public key. This ensures message integrity and confidentiality. Compression is applied before encryption to save space. Radix-64 encoding allows encrypted messages to be transmitted over email. PGP's features help secure email communications and stored files from unauthorized access.
The document discusses IEEE 802.11 standards for wireless LANs. It describes the formation of the IEEE 802.11 working group in 1990 to develop wireless LAN MAC and physical specifications. It then summarizes key IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, and more recent standards. It provides an overview of IEEE 802.11 architecture including the basic service set, extended service set, and distribution system. It also discusses services provided at the MAC layer such as reliable data delivery, access control, and security.
Frequency modulation (FM) is a modulation technique that varies the frequency of a carrier signal based on the message signal. FM is commonly used for broadcasting music and speech due to its resilience to noise and interference. It has advantages over AM such as better fidelity and the ability to use non-linear power amplifiers, though it requires more bandwidth. Applications of FM include radio broadcasting, two-way communications, telemetry, and magnetic tape recording.
- The Heartbleed bug disclosed in 2014 allowed hackers to access sensitive data from vulnerable OpenSSL servers. It was caused by a failure to implement proper input validation in the OpenSSL TLS heartbeat extension. This allowed attackers to retrieve up to 64KB of server memory with each request, potentially exposing private keys, user credentials, and other confidential information. Upgrading to OpenSSL 1.0.1g resolved the vulnerability by implementing the missing bounds check.
When network congestion occurs, routers become overloaded and either cannot forward packets fast enough or must discard queued packets to make room for new arrivals. Congestion is caused by packet arrival rates exceeding link capacity, insufficient memory, bursty traffic, or slow processors. Congestion control aims to efficiently use the network at high load and involves all routers and hosts, while flow control operates point-to-point between sender and receiver. Congestion control techniques include warning bits, choke packets, load shedding, random early discard, and traffic shaping to detect, recover from, and avoid congestion.
The document provides an overview of the World Wide Web (WWW) and Hypertext Transfer Protocol (HTTP). It discusses the structure of the WWW including clients, servers, caches and components like HTML, URLs, and browsers. HTTP is described as the application protocol that allows for data communication across the internet using requests and responses. Key aspects of HTTP like features, architecture, status codes, and request methods are summarized.
The data link layer provides services like error detection and correction to the network layer. It deals with issues like framing, flow control, and error handling when transmitting data frames between devices. Flow control mechanisms like stop-and-wait and sliding window are used to regulate frame transmission rates to prevent the receiver from being overwhelmed. Stop-and-wait allows sending one frame at a time while sliding window allows sending a fixed number of frames before needing an acknowledgment, improving efficiency over stop-and-wait. The data link layer frames network layer packets for transmission and handles issues like framing the data, detecting and correcting errors, and implementing flow control.
This document discusses network layer protocols including ARP, IPv4, ICMPv4, IPv6, and ICMPv6. It provides examples of how ARP maps IP addresses to physical addresses, how IPv4 handles packet fragmentation, and the types of ICMP messages. It also covers IPv6 addressing formats, the IPv6 packet format, and methods for transitioning from IPv4 to IPv6 such as tunneling and header translation.
HTTP is used to transfer documents over the internet. It uses a client-server model with requests and responses between clients and servers. Requests use methods like GET and HEAD along with URLs. Responses contain status lines and headers to provide information to clients. The World Wide Web uses HTTP and HTML documents that can be static, dynamic using CGI, or active using Java applets. HTML documents contain tags that control formatting and adding images, links, and other content.
The document discusses various consistency models including strict consistency, sequential consistency, causal consistency, pipelined random access memory consistency, processor consistency, and weak consistency. It focuses on explaining the sequential consistency model, which requires that all processes in the system see the memory operations in the same order, and allows different interleavings of read and write operations as long as this requirement is met. The document also discusses different strategies for implementing sequential consistency in distributed shared memory systems, including nonreplicated nonmigrating blocks, nonreplicated migrating blocks, replicated migrating blocks, and replicated nonmigrating blocks.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
This is the bottom sublayer of the Data Link Layer. This Chapter is especially relevant for LANs.
4.1 The Channel Allocation Problem
How to allocate a single channel among multiple users.
4.2 Multiple Access Protocols
How to handle contention for the use of a channel.
4.3 IEEE Standards for LANs
How do the protocols of the last sections apply to real systems. Here we talk about the actual standards in use.
4.4 Bridges
Ways of connecting networks together.
4.5 High Speed LANs
Directions in high speed networks.
WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
This presentation discusses quality of service (QoS) in data communication networks. It defines QoS as the ability of a network to provide better service to some data flows over others. The document outlines key QoS parameters like flow data transfer rates and transmission delays. It also describes flow characteristics such as reliability, delay, jitter, and bandwidth requirements. The presentation then covers techniques for improving QoS, including scheduling methods like priority queuing and traffic shaping using leaky bucket mechanisms. It discusses reserving network resources to ensure QoS and controlling admission of packets. Finally, the document lists some important applications of QoS in mobile communication, real-time media, interactive apps, and ATM networks.
This document discusses various approaches to improving TCP performance over mobile networks. It describes Indirect TCP, Snooping TCP, Mobile TCP, optimizations like fast retransmit/recovery and transmission freezing, and transaction-oriented TCP. Each approach is summarized in terms of its key mechanisms, advantages, and disadvantages. Overall, the document evaluates different ways TCP has been adapted to better support mobility and address challenges like frequent disconnections, packet losses during handovers, and high bit error rates over wireless links.
The document discusses the ALOHA protocol for medium access. It was developed at the University of Hawaii in 1971 to connect users across the Hawaiian islands via radio frequencies. There are two main versions: Pure ALOHA, where nodes transmit randomly, and Slotted ALOHA, where time is divided into slots for transmission. Slotted ALOHA improves on Pure ALOHA by reducing collisions to only those within a time slot. The maximum throughput for Pure ALOHA is 18.4% while Slotted ALOHA achieves 37%, but both protocols experience exponentially decreasing performance with only small increases in network load.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Congestion control, slow start, fast retransmit rajisri2
This document discusses TCP congestion control algorithms including slow start and fast retransmit. It provides overview and explanations of how these algorithms work to control congestion in a network. Slow start gradually increases data transmission to find the network's maximum capacity without overloading it. Fast retransmit allows retransmission of lost packets upon receiving three duplicate ACKs without waiting for timers, improving efficiency. These algorithms help prevent network congestion and allow for faster data transmission.
The document discusses information theory and source coding. It defines information and entropy, explaining that the amount of information contained in a message depends on its probability. The entropy of a data source measures the average information content. Huffman coding is presented as a method to assign variable-length codes to symbols to minimize the average code length. Error detection and correction codes are also summarized, including parity checking, cyclic redundancy checks (CRC), linear block codes, and convolutional codes.
SSH is a protocol for secure remote access to a machine over untrusted networks.
SSH is a replacement for telnet, rsh, rlogin and can replace ftp.
Uses Encryption.
SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter)
PGP (Pretty Good Privacy) is an open source encryption software that provides security mechanisms like authentication, confidentiality, compression, and email compatibility. It uses strong cryptographic algorithms like IDEA, RSA, and SHA-1. PGP protects messages by signing them with the sender's private key, encrypting them with a random symmetric key, and encrypting that key with the recipient's public key. This ensures message integrity and confidentiality. Compression is applied before encryption to save space. Radix-64 encoding allows encrypted messages to be transmitted over email. PGP's features help secure email communications and stored files from unauthorized access.
The document discusses IEEE 802.11 standards for wireless LANs. It describes the formation of the IEEE 802.11 working group in 1990 to develop wireless LAN MAC and physical specifications. It then summarizes key IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, and more recent standards. It provides an overview of IEEE 802.11 architecture including the basic service set, extended service set, and distribution system. It also discusses services provided at the MAC layer such as reliable data delivery, access control, and security.
Frequency modulation (FM) is a modulation technique that varies the frequency of a carrier signal based on the message signal. FM is commonly used for broadcasting music and speech due to its resilience to noise and interference. It has advantages over AM such as better fidelity and the ability to use non-linear power amplifiers, though it requires more bandwidth. Applications of FM include radio broadcasting, two-way communications, telemetry, and magnetic tape recording.
- The Heartbleed bug disclosed in 2014 allowed hackers to access sensitive data from vulnerable OpenSSL servers. It was caused by a failure to implement proper input validation in the OpenSSL TLS heartbeat extension. This allowed attackers to retrieve up to 64KB of server memory with each request, potentially exposing private keys, user credentials, and other confidential information. Upgrading to OpenSSL 1.0.1g resolved the vulnerability by implementing the missing bounds check.
When network congestion occurs, routers become overloaded and either cannot forward packets fast enough or must discard queued packets to make room for new arrivals. Congestion is caused by packet arrival rates exceeding link capacity, insufficient memory, bursty traffic, or slow processors. Congestion control aims to efficiently use the network at high load and involves all routers and hosts, while flow control operates point-to-point between sender and receiver. Congestion control techniques include warning bits, choke packets, load shedding, random early discard, and traffic shaping to detect, recover from, and avoid congestion.
The document provides an overview of the World Wide Web (WWW) and Hypertext Transfer Protocol (HTTP). It discusses the structure of the WWW including clients, servers, caches and components like HTML, URLs, and browsers. HTTP is described as the application protocol that allows for data communication across the internet using requests and responses. Key aspects of HTTP like features, architecture, status codes, and request methods are summarized.
The data link layer provides services like error detection and correction to the network layer. It deals with issues like framing, flow control, and error handling when transmitting data frames between devices. Flow control mechanisms like stop-and-wait and sliding window are used to regulate frame transmission rates to prevent the receiver from being overwhelmed. Stop-and-wait allows sending one frame at a time while sliding window allows sending a fixed number of frames before needing an acknowledgment, improving efficiency over stop-and-wait. The data link layer frames network layer packets for transmission and handles issues like framing the data, detecting and correcting errors, and implementing flow control.
This document discusses network layer protocols including ARP, IPv4, ICMPv4, IPv6, and ICMPv6. It provides examples of how ARP maps IP addresses to physical addresses, how IPv4 handles packet fragmentation, and the types of ICMP messages. It also covers IPv6 addressing formats, the IPv6 packet format, and methods for transitioning from IPv4 to IPv6 such as tunneling and header translation.
HTTP is used to transfer documents over the internet. It uses a client-server model with requests and responses between clients and servers. Requests use methods like GET and HEAD along with URLs. Responses contain status lines and headers to provide information to clients. The World Wide Web uses HTTP and HTML documents that can be static, dynamic using CGI, or active using Java applets. HTML documents contain tags that control formatting and adding images, links, and other content.
This document discusses several internet security protocols and technologies. It covers IP security protocols like AH and ESP which provide authentication, integrity, and privacy. It also discusses transport layer security with TLS and application layer security with PGP. Different types of firewalls are examined including packet-filter and proxy firewalls. Finally, it looks at virtual private networks as a technology for achieving privacy over public networks.
This document provides an overview of chapters in a book about application layer networking. It discusses the client-server model and socket interface. Chapter 24 focuses on the client-server relationship and model, and how sockets work for connectionless iterative and connection-oriented concurrent servers. The document outlines topics covered in each chapter relating to application layer protocols like DNS, SMTP, FTP, HTTP and multimedia.
This document discusses multimedia and interactive audio/video technologies on the internet. It covers topics like digitizing audio and video, compression standards like JPEG and MPEG, streaming stored and live content, and protocols for interactive audio/video like RTP, RTCP, SIP, and H.323. Diagrams are included to illustrate concepts like frame construction, streaming approaches using web servers or media servers, and protocols for real-time communication and signaling.
This document discusses cryptography and contains sections on symmetric-key cryptography, public-key cryptography, and security protocols on the internet. It includes diagrams of encryption algorithms like DES and RSA, as well as block ciphers, product blocks, substitution ciphers, and encryption modes like ECB and CBC. Key points covered include how symmetric-key cryptography uses the same key for encryption and decryption while public-key uses different keys, and how algorithms like DES are more complex versions of the Caesar cipher.
This document discusses connecting LANs, backbone networks, and virtual LANs. It describes different devices for connecting LAN segments such as repeaters, hubs, and bridges. It also discusses using spanning tree protocol to prevent loops when connecting multiple switches. Backbone networks can use a bus or star topology to connect remote LANs. Virtual LANs use software on switches to separate broadcast domains and create multiple logical networks over the same physical infrastructure.
The document discusses different types of transmission media, including guided media like twisted-pair cable, coaxial cable, and fiber-optic cable. It also discusses unguided media like radio waves, microwaves, and infrared signals. Twisted-pair cable is used for digital LANs up to 600 Mbps. Coaxial cable was used for thick and thin Ethernet. Fiber-optic cable uses glass strands to transmit data using light pulses and has very high bandwidth. Radio waves propagate through sky waves or ground waves and are used for radio, TV, and navigation. Microwaves use line-of-sight propagation for cellular networks and wireless LANs. Infrared can transmit over short ranges in a closed area
The document discusses point-to-point protocol (PPP) which establishes connections over telephone lines and digital subscriber lines. PPP uses a link control protocol (LCP) to establish, configure, and test the data link connection. LCP packets include configure-request, configure-ack and configure-nak. Authentication protocols like PAP and CHAP are used for authentication, and network control protocols like IPCP are used to configure network layer options.
This chapter discusses congestion control and quality of service techniques for data networks. It covers topics like traffic profiling, congestion and its effects on network performance, open and closed loop congestion control, examples of TCP and Frame Relay congestion control, flow characteristics and classes, scheduling algorithms, traffic shaping using leaky and token buckets, integrated services and differentiated services quality of service models, and quality of service in Frame Relay and ATM networks. The chapter also includes various figures illustrating related concepts.
This document discusses virtual circuit switching technologies including Frame Relay and ATM. It covers the phases of virtual circuit switching including setup, data transfer, and teardown. Frame Relay architecture is examined including its layers and use of DLCIs to identify virtual circuits. ATM is also summarized, including its use of fixed-size cells, multiplexing techniques, and architecture using virtual paths and connections defined by VPI and VCI numbers. The layers of both Frame Relay and ATM are depicted along with their addressing and encapsulation methods.
This document discusses multicast routing protocols. It introduces concepts like multicast trees, reverse path forwarding, and describes several multicast routing protocols including DVMRP, MOSPF, CBT, PIM, and MBONE. DVMRP uses reverse path forwarding and pruning/grafting to efficiently route multicast traffic to multiple receivers. PIM comes in two variants - PIM-DM for dense networks and PIM-SM for sparser wide area networks. MBONE enables multicast routing over the Internet using logical tunneling between multicast routers.
The document discusses electronic mail (email) and file transfer protocols.
It provides an overview of email components like mail addresses, user agents, mail transfer agents, and mail access protocols. It also describes the format of emails and common data types in MIME.
For file transfer, it explains that FTP uses TCP connections and ports 20 and 21. It gives examples of transferring files between an FTP client and server by issuing commands over the control connection and transferring data over the data connection. Anonymous FTP is also demonstrated.
This document discusses message security, user authentication, and key management. It covers digital signatures, symmetric and asymmetric encryption, authentication using keys or nonces, key distribution methods like Diffie-Hellman, and public key infrastructure including the X.500 standard and certificate fields. Kerberos is introduced as a network authentication system using ticket-granting servers. Diagrams illustrate privacy, signatures, authentication approaches, man-in-the-middle attacks, key distribution centers, and the Kerberos process.
This document discusses the evolution of Ethernet technology over three generations from traditional Ethernet to Fast Ethernet to Gigabit Ethernet. It describes the MAC and physical layers of each generation and shows diagrams of their frame formats, implementations, and encoding techniques. Key aspects covered include Ethernet addressing, connection methods, bandwidth sharing, bridging, switching, full-duplex operation, and standards such as 802.3.
The document discusses the domain name system (DNS) which provides a hierarchical and distributed naming system that translates human-friendly domain names to IP addresses. DNS uses a system of name servers that are organized into zones to distribute the mapping of domain names to IP addresses globally. Resolvers use recursive or iterative resolution processes to map names to addresses by querying name servers in the DNS hierarchy.
The document discusses network models and layers. It describes a layered model with physical, data link, network, transport, and application layers. The physical layer transmits individual bits between nodes. The data link layer transmits frames between nodes and uses physical addresses. The network layer delivers packets from source to destination, using network addresses. The transport layer delivers messages between processes, using port addresses. The application layer provides services to users. Figures are included to illustrate examples of how data is encapsulated and transmitted across each layer.
The document discusses network layer concepts including addressing, routing, and protocols. It covers IP addressing schemes like classful addressing and subnetting. It also describes routing techniques like next-hop, network-specific, host-specific, and default routing. Examples are provided to illustrate how routers use routing tables to forward packets based on the destination IP address.
The document discusses multiple access protocols for wireless networks. It describes random access methods like ALOHA, CSMA, and CSMA/CA. It also covers controlled access methods using reservation, polling, and token passing. Finally, it examines channelization techniques for dividing bandwidth like FDMA, TDMA, and CDMA. It provides examples checking properties of orthogonal codes used in CDMA.
Wireless LANs use the IEEE 802.11 standard which defines the physical and MAC layers. The physical layer uses either frequency hopping spread spectrum or direct sequence spread spectrum to transmit over radio frequencies. The MAC layer uses CSMA/CA for channel access and defines frame formats for addressing between devices in a basic service set or extended service set. Bluetooth uses a piconet topology with a master-slave relationship between devices for communication at the baseband layer, and supports both single-slave and multiple-slave communication through its L2CAP layer.
session -7 - Sliding Window Protocol 1- N oisy Channels.pptnanisrikar276711
1) Stop-and-wait ARQ is the simplest flow and error control protocol. It uses only two sequence numbers (0 and 1) and the transmitter waits for an ACK after sending each frame before sending the next frame.
2) Go-back-N ARQ improves efficiency by allowing multiple frames to be outstanding by using a sliding window. If a frame is not ACKed, the transmitter resends that frame and all subsequent frames.
3) Selective repeat ARQ further improves efficiency for noisy channels by only resending the specific frame that was not received correctly, avoiding resending subsequent frames. It uses negative ACKs and has more complex processing than Go-back-N ARQ.
Flow control specifies how much data a sender can transmit before receiving permission to continue. There are two main types of flow control: stop-and-wait and sliding window. Stop-and-wait allows transmission of one frame at a time, while sliding window allows transmitting multiple frames before needing acknowledgement. Sliding window flow control uses variables like window size, last ACK received, and last frame sent to determine how transmission proceeds. It provides more efficiency than stop-and-wait. Automatic repeat request (ARQ) handles retransmission of lost or damaged frames through timeouts, negative acknowledgements, or cumulative acknowledgements depending on the specific ARQ protocol used.
The document discusses various error control techniques used at the data link layer, including parity checks, checksums, and automatic repeat request (ARQ) protocols. It describes stop-and-wait ARQ, go-back-n ARQ, and selective reject ARQ. For example, stop-and-wait ARQ involves the sender transmitting a single frame and waiting for an acknowledgment before sending the next frame. Go-back-n ARQ allows the sender to transmit multiple frames before waiting for an acknowledgment.
The document discusses various error control techniques used in data communication including error detection, positive acknowledgment, negative acknowledgment, automatic repeat request, stop-and-wait ARQ, go-back-N ARQ, and selective reject ARQ. Stop-and-wait ARQ is the basic technique where the sender retransmits the last frame if no acknowledgment is received within a timer period. Sliding window protocols allow multiple unacknowledged frames to be sent to improve efficiency.
Flow and error control are important for reliable communication. Flow control manages the amount of data sent, while error control ensures data arrives error-free. There are two main methods for flow control: stop-and-wait, which waits for an acknowledgment after each frame, and sliding window, which allows sending multiple frames before waiting for an acknowledgment. For error control, automatic repeat request (ARQ) is used, where the receiver sends acknowledgments or negative acknowledgments and the sender retransmits lost or corrupted frames. Two common ARQ schemes are stop-and-wait ARQ and sliding window ARQ.
This document discusses various protocols used at the data link layer, including framing, flow control, and error control. It covers the simplest protocol, stop-and-wait protocol, and various automatic repeat request (ARQ) protocols for both noiseless and noisy channels. The key protocols discussed are stop-and-wait ARQ, go-back-N ARQ, and selective repeat ARQ. These protocols use concepts like framing, sequencing, acknowledgments, timers, and sliding windows to provide reliable data transmission over networks.
Data link control protocols provide flow control and error control to ensure reliable data transmission. Flow control prevents buffer overflow by regulating transmission rate. Error control detects and corrects errors through techniques like error detection, acknowledgments, and retransmissions of damaged frames. Common protocols include stop-and-wait, go-back-N, and selective reject under HDLC which is a widely used standard.
1. Stop-and-wait ARQ is the simplest flow control mechanism where the transmitter sends a single frame and waits for an acknowledgment before sending the next frame. It uses only two sequence numbers (0 and 1) and the acknowledgment number indicates the next expected frame number.
2. In the event of a lost or damaged frame, the same process is followed by the receiver who sends no negative acknowledgment and the sender retransmits the frame. If the acknowledgment is lost, the frame is retransmitted after a timer expires.
3. Go-back-N ARQ improves efficiency over stop-and-wait by allowing multiple outstanding frames using a sliding window approach at the sender. If a frame is
This document discusses protocols and mechanisms for data link control and data transmission. It describes framing, flow control, error control, and various data link protocols. Specifically, it covers byte stuffing, bit stuffing, stop-and-wait, go-back-N, and selective repeat automatic repeat request (ARQ) protocols. It also discusses the High-Level Data Link Control (HDLC) and Point-to-Point Protocol (PPP) in detail, including their frame formats, operation modes, and use of sequence numbers for error control.
The document discusses the Stop-and-Wait Automatic Repeat Request (ARQ) protocol. It explains that with Stop-and-Wait ARQ, the sender sends one frame at a time and waits for an acknowledgment before sending the next frame. If the acknowledgment is not received within a timeout period, the sender retransmits the frame. Issues like damaged or lost acknowledgments are addressed through the use of sequence numbers that alternate with each frame.
The document discusses various automatic repeat request (ARQ) protocols used for error control in data transmission. It describes stop-and-wait ARQ, go-back-N ARQ, and selective repeat ARQ. Stop-and-wait ARQ involves transmitting a frame and waiting for an acknowledgment before sending the next frame. Go-back-N ARQ allows transmitting multiple frames before waiting for acknowledgments and retransmitting all unacknowledged frames if needed. Selective repeat ARQ uses a receiving window to buffer out-of-order frames and retransmit only missing frames.
The document discusses various topics related to flow and error control in computer networks, including stop-and-wait ARQ, sliding window protocols, and selective reject ARQ. Stop-and-wait ARQ allows transmission of one frame at a time, while sliding window protocols allow multiple outstanding frames using sequence numbers and acknowledgments. Go-back-N ARQ requires retransmission of frames from the lost frame onward, while selective reject ARQ only retransmits the lost frame to minimize retransmissions.
Flow control is used to prevent a sender from overwhelming a receiver. It uses feedback from the receiver to control sending. Stop-and-wait protocols only allow one frame to be sent before waiting for acknowledgement. Go-back-n protocols allow multiple unacknowledged frames but require resending all frames if any are lost. Selective repeat protocols only resend lost frames to improve efficiency.
Sliding window flow control allows multiple frames to be transmitted before an acknowledgement is required. It uses sequence numbers and windows to track acknowledged frames. The receiver has a buffer and can receive up to W frames before needing to acknowledge. There are different error control protocols like stop-and-wait, go-back-N, and selective reject that use timeouts, acknowledgements, and retransmissions to ensure reliable data transmission.
The document summarizes key aspects of the data link layer, including that it provides node-to-node communication, error control methods like CRC and checksum, access control methods like CSMA/CD, uses physical addresses, and sends data in frames. It then discusses flow control methods at the data link layer like stop-and-wait ARQ and sliding window protocols, providing details on how each method works, advantages, disadvantages, and examples.
Flow control and error control are responsible for managing data transmission rates and ensuring reliable data transmission on the data link layer of the OSI model. Flow control involves the receiver notifying the sender of its buffer limit and acknowledging received data so the sender does not overflow the receiver's buffer. Error control involves the sender retransmitting frames if acknowledgment of receipt is not received. Three common error control protocols are stop-and-wait ARQ, go-back-N ARQ, and selective repeat ARQ, which differ in their window sizes and retransmission strategies.
This document summarizes different data link layer flow control and error control protocols:
1) Stop-and-wait protocols require the sender to wait for an acknowledgment after sending each frame before sending the next frame. Automatic repeat request (ARQ) can be added to support retransmission of lost frames.
2) Sliding window protocols allow the sender to send multiple frames before waiting for an acknowledgment, improving throughput. Go-back-N ARQ requires retransmitting all unacknowledged frames if any frame is lost, while selective repeat ARQ only retransmits lost frames.
3) Flow control protocols like stop-and-wait and sliding windows control the flow of data to prevent the receiver from being overwhelmed
The document discusses various data link layer protocols for flow and error control. It begins by explaining the basic functions of flow control and error control. It then describes some simple protocols that could be used over noiseless channels, including the simplest protocol and stop-and-wait protocol. The document goes on to introduce protocols that add error control functionality to handle noisy channels, such as stop-and-wait automatic repeat request (ARQ). It provides examples of how these protocols work using sequencing and acknowledgments.
This document summarizes key concepts around data link control, flow control, and error control from a lecture on data communications and networking. It discusses how flow control coordinates data transmission and reception to prevent overwhelm, and how error control detects and retransmits damaged or lost frames using techniques like stop-and-wait ARQ. The stop-and-wait ARQ method is explained, covering normal operation as well as how lost, damaged, and delayed frames and acknowledgements are handled.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
4. RELIABLE TRANSMISSION
Sender Side:
Network Layer (N/L) waits for an EVENT
EVENT : (Request To Send) the data is made by sender
When sender wants to send data
Network Layer Gets Data from upper Layers
Data-Link Layer packages the data and Makes Frame
Physical Layer Sends Frame in form of signal
Receiver Side:
Physical Layer waits for an EVENT
EVENT :(Arrival Notification) of frame is made to Data-Link Layer
When the frame arrives at the receiver
Physical layer Receives Frame
Data-Link Layer Extracts Data from the frame and Delivers Data
to Network Layer
5. Network
Data Link
Physical
Network
Data Link
Physical
Waiting for EVENT
Request To Send
Sender wants to send data
Gets Data
Sends Frame in signal form
Get Data( ) Make Frame ( ) Send Frame( )
Waiting for EVENT
Makes Frame
Arrival Notification
Frame arrives at receiver
Receives Frame
Extracts Data
Delivers Data
Receive Frame( ) Extract Data ( )
Deliver
Data( )
6. while(true)
{
WaitForEvent( )
If Event( RequestToSend( ) )
{
Get Data ( )
Make Frame( )
Send Frame( )
}
}
while(true)
{
WaitForEvent( )
If Event( ArrivalNotification( ) )
{
Receive Frame ( )
Extract Data( )
Deliver Data( )
}
}
Request To Send
Network
Data Link
Physical Arrival Notification
Physical
Data Link
Network
7. RELIABLE TRANSMISSION
When an error is introduced into the frames and they get
corrupted.
We can use some Error Correction Scheme (ECS) to correct
them
But ECS produce a very large overhead
Or even some errors are to severe to be corrected by ECS
So ultimately we need to discard the frames
We need some strategy to RECOVER these discarded frames
Flow Control: Sender needs to make sure that it is not
sending “more data” then the capacity of receiver
8. RELIABLE TRANSMISSION
Every strategy used for recovering frames involves two common
concepts
Acknowledgement (Ack)
Whenever frame arrives at the receiver and it is not corrupted
Receiver sends a control frame back to sender for confirmation purpose
This control frame is called Acknowledgement (Ack) frame
Timeout
Whenever sender transmits a frame it then waits for the
acknowledgement by starting a timer
This waiting time is usually equal to Round Trip Time (RTT)
If the acknowledgement does not come back with in waiting time,
an EVENT occurs called “Timeout”
When “Timeout” event occurs sender retransmits the frame
9. RELIABLE TRANSMISSION
The general strategy to implement Acknowledgements &
Timeout is sometimes called
ARQ ( Automatic Repeat Request )
We will study the following ARQ Algorithms
Stop-And-Wait ARQ
Go-Back-N ARQ
Selective Repeat ARQ
10. Stop-And-Wait ARQ
Stop-And-Wait ARQ
The simplest ARQ scheme is the stop-and-wait algorithm
After transmitting one frame, the Sender
Starts the timer and STOPS the transmission
WAITS for an acknowledgment until the timer expires
If the acknowledgement comes back before the expiration
of timer only then next frame is transmitted
If the acknowledgment does not arrive before the
expiration of timer
the sender times out and retransmits the original frame.
13. Stop-And-Wait ARQ
So apart from corrupted frames RECEIVER may also face
problems of Duplicated frames and Out-Of-Order frames (Lost
frames)
A corrupted frame can be detected by an error detection
strategy
For detecting Duplicated frames and Lost frames
Every fame is given a special number called
SEQUENCE NUMBER
If two received frames have same sequence number, it
indicates that frames are duplicated
If two frames come out of order, it means that a frame in
between may have been lost
14. Stop-And-Wait ARQ
Like data frames acknowledgements are also given Sequence
Numbers (or Acknowledgement Number)
The Acknowledgement Number is actually the sequence number
of next Expected Frame i.e.
Ack_No:= Seq_No + 1
So when a receiver accepts a Data Frame with Seq_No:=3
Receiver sends an acknowledgement back to sender with Ack_No:=4
When sender receives the Acknowledgement with Ack_No:=4,
This tells the sender that receiver has received the frame with Seq_No:=3
And now it is expecting the next frame with Seq_No:=4
15. Stop-And-Wait ARQ
How many frames can be counted by the Sequence Number?
If M bits are used for the sequence number
It can count 2M frames
Where the count begins from zero and goes up to 2M - 1
If there are more then 2M frames, the counting is again repeated
from 0 to 2m - 1
For example if 3 bits are used for the sequence number
It can count 23 frames, i.e. 8 frames
Where the count goes from 0 to 7
If there are 8th, 9th and 10th frames, they will be numbered 0, 1 and 2
The size of sequence number field should be chosen to
minimize the size of frames
16. Stop-And-Wait ARQ
For the sake of Stop-and-Wait ARQ, there can only be at
most two frames on the communication line
Data Frame and Acknowledgement Frame
So one bit is enough to count the frame and
acknowledgement, i.e. using one bit possible values = 0, 1
The 4 frames will be counted like this: 0, 1, 0, 1
Now if sender sends a frame with Seq_No:= 0
The Receiver will send an Acknowledgement with
Ack_No:=1
18. Data
Frame Sn = 0
Event
canSend
Sequence Number
True
Sn = 0
RequestToSend
Frame Sn = 0
Sn = 1
False
Frame Ackn = 1
Arrival Notification
True
19. Data
Frame Sn = 0
Event
canSend
Sequence Number
True
Sn = 0
RequestToSend
Frame Sn = 0
Sn = 1
False
Arrival NotificationEvent TimeOut ( )
Frame Sn = 0
20. SN = 0;
canSend = True;
While ( true ) {
WaitForEvent( );
If Event( RequestToSend( ) And canSend = True ) {
Get Data ( );
Make Frame ( SN );
Store Frame ( SN );
Send Frame ( SN );
Start Timer ( );
SN = ( SN + 1 ) % 2
canSend = False;
}
28. Go-Back-N ARQ
In this protocol we can send multiple frames without receiving
acknowledgement
This protocol uses a logical concept called:
SLIDING WINDOW
Collection of frames that can be transmitted without receiving
acknowledgement
Unacknowledged frames which are transmitted i.e. the frames
present in the window are called Outstanding frames
This protocol also uses the concept of:
CUMULATIVE ACKNOWLEDGEMENT
A single acknowledgement frame which acknowledges multiple
frames
A single timer can run for all the frames
Or separate timers can run for every frame
29. Go-Back-N ARQ
A window is divided into three parts
Frames that have
already been
acknowledged,
sender ignores
these frames
completely
SENDER WINDOW
Outstanding frames
with unknown status,
i.e. their
acknowledgement
has not yet arrived
(actual window)
Frames that cannot be
transmitted. Every
time ACK of
outstanding frame
arrives, the window
slides to right
0 1 2 3 4 5 6 7 8 9 10 11
Receiver window
contains only one frame
30. Go-Back-N ARQ
Procedure:
Suppose the sender window size is 3 frames
Sender transmits frame 0,1 and 2 without waiting for
acknowledgement
After transmitting frame 0, it immediately starts the timer
Receiver sends an acknowledgement for every frame
Every time acknowledgment arrives,
Sender window slides to the right, meaning one more frame enters the
window and the Acknowledged Frame exits the window
If the acknowledgment does not come, the sender goes back to the
beginning of window and retransmits all frames
Hence the name Go-Back-N ARQ
33. F0
F1
F2
TIMEOUT
SENDER RECEIVER
F3
A1
Go-Back-N ARQ F2 arrives at the receiver
Where receiver is expecting F1
An out-of-order frame
So receiver discards it
And also the frame after it
Ultimately timer times out
Sender goes back to the
beginning of window (i.e. F1)
Retransmits all the frames
Go-Back-N ARQ
34. Size of Window:
How many frames can be sent without receiving
acknowledgement? Or in other words
How many frames can be outstanding?
We know that m bits can count 2m frames
But
Go-Back-N ARQ
If
m bits are used for sequence
number field then:
size of window <= 2m – 1
35. Go-Back-N ARQ
If m bits
are used for sequence number field
then:
size of window <= 2m – 1
If We break this rule, receiver cannot
detect duplicate frames, i.e. if keep
the window size = 2m
36. Go-Back-N ARQ
Suppose m is 3 bits so it can count 2m = 23 = 8 frames
Frames are numbered as 0,1,2,3,4,5,6,7
The size of window should be 2m – 1 = 23 – 1 = 7
Now instead of 7 we choose window size = 23 = 8
Entire window is transmitted i.e. frames from 0,1,….7
All Frames were received correctly but their acknowledgements were lost
Next expected frame by the receiver is frame-0.
Sender retransmits frame-0 but this is not the new frame, it’s
the duplicate of first frame in window
But sender mistakenly accepts this frame as the new frame
instead of discarding it
37. Go-Back-N ARQ
Suppose m is 3 bits so it can count 2m = 23 = 8 frames
Frames are numbered as 0,1,2,3,4,5,6,7
This time we choose size of window = 2m – 1 = 7
Entire window is transmitted i.e. frames from 0,1,….6
All Frames were received correctly but their acknowledgements
were lost
Next expected frame by the receiver is frame-7
Sender retransmits frame-0
Since receiver has already received frame-0 and is expecting
frame-7
So receiver detects the duplicate frame and rightfully discards it
39. Event
Sender Window Size
Seq_No of First
Outstanding Frame
SW = 2
SF = 0
RequestToSend
Seq_No of Next Frame to
be transmitted
SN = 0
DataFrame Sn = 0
Frame Sn = 0
SN = 1
Frame Sn = 1
Frame Sn = 1
SN = 2
40. SW = 2m – 1
SF = 0
SN = 0
While ( true ) {
WaitForEvent( );
If Event ( RequestToSend )
{
If ( SN – SF >= SW )
Sleep ( )
Get Data ( );
Make Frame ( SN );
Store Frame ( SN );
Send Frame ( SN );
SN = SN + 1
If ( Timer Not Running )
Start Timer( )
}
41. Frame Ackn = 1
Sender Window Size
Seq_No of First
Outstanding Frame
SW = 2
SF = 0
Seq_No of Next Frame to
be transmitted
SN = 0SN = 1SN = 2
Frame Sn = 0
Frame Sn = 1
Event
Arrival Notification
Frame Sn = 0
Frame Sn = 1
SF = 1
42. If Event( Arrival Notification( ) )
{
Receive Frame ( AckN );
If ( Corrupted Acknowledgement )
Sleep ( );
If ( Ack No > SF and Ack No <= SN )
While ( SF < Ack No )
{
Purge Frame(SF )
SF = SF + 1
}
Stop Timer ( )
}
43. Sender Window Size
Seq_No of First
Outstanding Frame
SW = 2
SF = 0
Seq_No of Next Frame to
be transmitted
SN = 0SN = 1SN = 2
Frame Sn = 0
Frame Sn = 1
Event
Time Out
Frame Sn = 0
Frame Sn = 1
Temp = 0Temp = 1Temp = 2
44. If Event( Time Out ) {
Start Timer( );
Temp = SF
While ( Temp < SN )
{
Send Frame( Temp )
Temp = Temp + 1
}
}
}