SlideShare a Scribd company logo
GO-BACK-N PROTOCOL
DONE BY:
STEFFY.D(140071601072)
SHEREEN FATHIMA.A(140071601068)
TASNIM TABASUM.R(140071601080)
COMPUTER NETWORKS LAB
B.S.ABDUR RAHMAN UNIVERSITY
CONTENTS
• ARQ
• Definition
• Why we need GBN?
• Sender window size.
• Receiver window size.
• Data packet is lost.
• Acknowledgement
• Advantages
Automatic Repeat Request(ARQ)
• Systems which automatically request the retransmission of missing
packets or packets with errors are called ARQ systems.
Three common schemes are used:
• Stop & Wait
• Go Back N
• Selective Repeat
DEFINITION
• Go-Back-N ARQ is a specific instance of the automatic repeat request
(ARQ) protocol, in which the sending process continues to send a number
of frames specified by a window size even without receiving an
acknowledgement(ACK) packet from the receiver.
• GBN is a practical approach of sliding window protocol.
Why we need GBN?
• To improve efficiency of transmission.
• To send more than one frames at a time.
• To reduce waiting time of the sender .
• (i.e.)Sender is waiting for an acknowledgement from the
receiver.
Sender sliding Window
• Sender can transmit N frames before receiving ACK.
• Its window size will be N.
• Sender will maintain a copy of sent packets in sent buffer until for the
particular sent packets are acknowledged.
• Sender will resend all packets if the timeout timer runs out.
• Once data get acknowledged by the receiver, that particular data will be
removed from the buffer.
Receiver sliding window
• Size of the window at the receiving
site is always 1 in this protocol.
• Receiver is always looking for a
specific frame to arrive in a specific
order.
• Any frame arriving out of order is
discarded and needs to be resent.
• Receiver window slides as shown in
fig. Receiver is waiting for frame 0
in part a.
Receiver sliding window
• Receiver sends positive ACK if a frame arrived safe and in order.
• The silence of the receiver causes the timer of the unacknowledged frame to expire.
• Then the sender resends all frames, beginning with the one with the expired timer.
• For example, suppose the sender has sent frame 6, but the timer for frame 3 expires (i.e.
frame 3 has not been acknowledged), then the sender goes back and sends frames 3, 4, 5,
6 again. Thus it is called Go-Back-N-ARQ
• The receiver does not have to acknowledge each frame received, it can send one
cumulative ACK for several frames.
Sender window size.
• Sender window size in GBN is N itself.
• N value must be greater than 1
• If N value is equal to 1,then it is stop & wait protocol.
Representation:
GBN=GB10=>N=10=>sender window size.
Receiver window size
• Receiver window size is always 1.
Let us consider an example,GB4=>N=4=>sender window size.
SENDER RECEIVER
3 2 1 0 0
1
0
2
3
1 2 3
Ack0
Ack1
Ack2
Ack3
Normal operation
Data packet is lost
0
1
2
3
3 2 1 0
SENDER RECEIVER
Ack 0
Ack 1
T0 timer
2
3
0 1
Retransmission
45
4
5
5
4
1
0
2
3
Acknowledgement
• There are two types of acknowledgement used in GBN
•Cumulative Acknowledgement
•Independent Acknowledgement
COMPARISON
Cumulative Acknowledgement
• Traffic is less
• Reliability is less
Independent Acknowledgement
• Traffic is more
• Reliability is more
Graphical Representations
Cumulative Acknowledgement
1 0
Independent Acknowledgement
0 1
0
1
0
1
Ack 0
Ack 1
1 0
sender
Receiver sender Receiver
0 1
Acknowledgement Timer
0
1
2
3Ack 2
Ack 4
3 2 1 0 0 1 2 3
Acknowledgement timer
sender
case: 1
Acknowledgement Timer is too big:
• ADVANTAGE :
More packets can be acknowledged at a time at the receiver
side.
• DISADVANTAGE:
Timeout(To) timer runs out at the sender side.
Case : 2
Acknowledgement Timer is too small:
• DISADVANTAGE: Acknowledgement will be send by the receiver for
every packets.
• So , Acknowledgement timer should not be too small or too big. It should
be a timer with fixed size.
• Timeout timer must be greater than the Acknowledgement timer.
Relation between window size and sequence
number
3 2 1 0
0
0
1
2
3To
3 0 121
0
1
2
3
2 3
Duplicate packets
ADVANTAGES
• The sender can send many frames at a time.
• Timer can be set for a group of frames.
• Only one ACK can acknowledge one or more frames.
• Efficiency is more.
• Waiting time is pretty low.
Points to be remembered
• Sender window size is N & N value must be greater than 1
• Receiver window size is always 1
• There are two types of acknowledgement in GBN
•Cumulative Acknowledgement
•Independent acknowledgement
Go back-n protocol
Ad

More Related Content

What's hot (20)

Go Back N ARQ
Go  Back N ARQGo  Back N ARQ
Go Back N ARQ
guesta1b35273
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
Manusha Dilan
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
shilpa patel
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
praneetayargattikar
 
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Kongu Engineering College, Perundurai, Erode
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
Venkata Sreeram
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
tameemyousaf
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
shayan singla
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
Anand Biradar
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
shivani monga
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
Kinza Razzaq
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
Manusha Dilan
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
shilpa patel
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
tameemyousaf
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
Anand Biradar
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
Kinza Razzaq
 

Viewers also liked (9)

Aug.11
Aug.11Aug.11
Aug.11
Yesh Lazarte
 
US APPAREL BOARDSHORT CATALOG 2017
US APPAREL BOARDSHORT CATALOG 2017US APPAREL BOARDSHORT CATALOG 2017
US APPAREL BOARDSHORT CATALOG 2017
Joyce Orloff
 
SWISS BULLION
SWISS BULLIONSWISS BULLION
SWISS BULLION
Yesh Lazarte
 
Article
ArticleArticle
Article
afnan afnan
 
Health and Wellness Coaching
Health and Wellness CoachingHealth and Wellness Coaching
Health and Wellness Coaching
TIM ELLIS
 
Colombia - Chile - Peru GRI Brochure
Colombia - Chile - Peru GRI BrochureColombia - Chile - Peru GRI Brochure
Colombia - Chile - Peru GRI Brochure
Global Real Estate Institute
 
NaHHA Annual Report 2014
NaHHA Annual Report 2014NaHHA Annual Report 2014
NaHHA Annual Report 2014
iHawaiidigital
 
Gideon
GideonGideon
Gideon
Malherbe G.
 
Hotel z pomysłem - Cinema Residence
Hotel z pomysłem - Cinema Residence Hotel z pomysłem - Cinema Residence
Hotel z pomysłem - Cinema Residence
Cinema Hotel
 
US APPAREL BOARDSHORT CATALOG 2017
US APPAREL BOARDSHORT CATALOG 2017US APPAREL BOARDSHORT CATALOG 2017
US APPAREL BOARDSHORT CATALOG 2017
Joyce Orloff
 
Health and Wellness Coaching
Health and Wellness CoachingHealth and Wellness Coaching
Health and Wellness Coaching
TIM ELLIS
 
NaHHA Annual Report 2014
NaHHA Annual Report 2014NaHHA Annual Report 2014
NaHHA Annual Report 2014
iHawaiidigital
 
Hotel z pomysłem - Cinema Residence
Hotel z pomysłem - Cinema Residence Hotel z pomysłem - Cinema Residence
Hotel z pomysłem - Cinema Residence
Cinema Hotel
 
Ad

Similar to Go back-n protocol (20)

Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
mqasimsheikh5
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
ManishTadhiyal
 
Flow control main
Flow control mainFlow control main
Flow control main
Nitesh Singh
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
Inocentshuja Ahmad
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
Pradeep Kumar TS
 
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
gagansaigudi
 
09 coms 525 tcpip - tcp 2
09   coms 525 tcpip - tcp 209   coms 525 tcpip - tcp 2
09 coms 525 tcpip - tcp 2
Palanivel Kuppusamy
 
Flow Control.pptx
Flow Control.pptxFlow Control.pptx
Flow Control.pptx
AshokRachapalli1
 
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptxLecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
SuhaniTalreja
 
Go back.pptx
Go back.pptxGo back.pptx
Go back.pptx
Mithunkumar91359
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control
gondwe Ben
 
Flow control
Flow controlFlow control
Flow control
STEFFY D
 
14-Error Detection Techniques-22-01-2025.pdf
14-Error Detection Techniques-22-01-2025.pdf14-Error Detection Techniques-22-01-2025.pdf
14-Error Detection Techniques-22-01-2025.pdf
abhimanyuyadav2022
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Flow control
Flow controlFlow control
Flow control
steffy D
 
Transport layer
Transport layerTransport layer
Transport layer
steffy1996
 
flow control pptx for computer networking
flow control pptx for computer networkingflow control pptx for computer networking
flow control pptx for computer networking
VijayVishal8
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 
Harjot computer networks veryGBN ARQ.pptx
Harjot  computer networks veryGBN ARQ.pptxHarjot  computer networks veryGBN ARQ.pptx
Harjot computer networks veryGBN ARQ.pptx
baadshahyash
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
Diptanshu singh
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
mqasimsheikh5
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
ManishTadhiyal
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
Inocentshuja Ahmad
 
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
gagansaigudi
 
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptxLecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
SuhaniTalreja
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control
gondwe Ben
 
Flow control
Flow controlFlow control
Flow control
STEFFY D
 
14-Error Detection Techniques-22-01-2025.pdf
14-Error Detection Techniques-22-01-2025.pdf14-Error Detection Techniques-22-01-2025.pdf
14-Error Detection Techniques-22-01-2025.pdf
abhimanyuyadav2022
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Flow control
Flow controlFlow control
Flow control
steffy D
 
Transport layer
Transport layerTransport layer
Transport layer
steffy1996
 
flow control pptx for computer networking
flow control pptx for computer networkingflow control pptx for computer networking
flow control pptx for computer networking
VijayVishal8
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 
Harjot computer networks veryGBN ARQ.pptx
Harjot  computer networks veryGBN ARQ.pptxHarjot  computer networks veryGBN ARQ.pptx
Harjot computer networks veryGBN ARQ.pptx
baadshahyash
 
Ad

Recently uploaded (20)

Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 

Go back-n protocol

  • 1. GO-BACK-N PROTOCOL DONE BY: STEFFY.D(140071601072) SHEREEN FATHIMA.A(140071601068) TASNIM TABASUM.R(140071601080) COMPUTER NETWORKS LAB B.S.ABDUR RAHMAN UNIVERSITY
  • 2. CONTENTS • ARQ • Definition • Why we need GBN? • Sender window size. • Receiver window size. • Data packet is lost. • Acknowledgement • Advantages
  • 3. Automatic Repeat Request(ARQ) • Systems which automatically request the retransmission of missing packets or packets with errors are called ARQ systems. Three common schemes are used: • Stop & Wait • Go Back N • Selective Repeat
  • 4. DEFINITION • Go-Back-N ARQ is a specific instance of the automatic repeat request (ARQ) protocol, in which the sending process continues to send a number of frames specified by a window size even without receiving an acknowledgement(ACK) packet from the receiver. • GBN is a practical approach of sliding window protocol.
  • 5. Why we need GBN? • To improve efficiency of transmission. • To send more than one frames at a time. • To reduce waiting time of the sender . • (i.e.)Sender is waiting for an acknowledgement from the receiver.
  • 6. Sender sliding Window • Sender can transmit N frames before receiving ACK. • Its window size will be N. • Sender will maintain a copy of sent packets in sent buffer until for the particular sent packets are acknowledged. • Sender will resend all packets if the timeout timer runs out. • Once data get acknowledged by the receiver, that particular data will be removed from the buffer.
  • 7. Receiver sliding window • Size of the window at the receiving site is always 1 in this protocol. • Receiver is always looking for a specific frame to arrive in a specific order. • Any frame arriving out of order is discarded and needs to be resent. • Receiver window slides as shown in fig. Receiver is waiting for frame 0 in part a.
  • 8. Receiver sliding window • Receiver sends positive ACK if a frame arrived safe and in order. • The silence of the receiver causes the timer of the unacknowledged frame to expire. • Then the sender resends all frames, beginning with the one with the expired timer. • For example, suppose the sender has sent frame 6, but the timer for frame 3 expires (i.e. frame 3 has not been acknowledged), then the sender goes back and sends frames 3, 4, 5, 6 again. Thus it is called Go-Back-N-ARQ • The receiver does not have to acknowledge each frame received, it can send one cumulative ACK for several frames.
  • 9. Sender window size. • Sender window size in GBN is N itself. • N value must be greater than 1 • If N value is equal to 1,then it is stop & wait protocol. Representation: GBN=GB10=>N=10=>sender window size.
  • 10. Receiver window size • Receiver window size is always 1. Let us consider an example,GB4=>N=4=>sender window size. SENDER RECEIVER 3 2 1 0 0 1 0 2 3 1 2 3 Ack0 Ack1 Ack2 Ack3 Normal operation
  • 11. Data packet is lost 0 1 2 3 3 2 1 0 SENDER RECEIVER Ack 0 Ack 1 T0 timer 2 3 0 1 Retransmission 45 4 5 5 4 1 0 2 3
  • 12. Acknowledgement • There are two types of acknowledgement used in GBN •Cumulative Acknowledgement •Independent Acknowledgement
  • 13. COMPARISON Cumulative Acknowledgement • Traffic is less • Reliability is less Independent Acknowledgement • Traffic is more • Reliability is more
  • 14. Graphical Representations Cumulative Acknowledgement 1 0 Independent Acknowledgement 0 1 0 1 0 1 Ack 0 Ack 1 1 0 sender Receiver sender Receiver 0 1
  • 15. Acknowledgement Timer 0 1 2 3Ack 2 Ack 4 3 2 1 0 0 1 2 3 Acknowledgement timer sender
  • 16. case: 1 Acknowledgement Timer is too big: • ADVANTAGE : More packets can be acknowledged at a time at the receiver side. • DISADVANTAGE: Timeout(To) timer runs out at the sender side.
  • 17. Case : 2 Acknowledgement Timer is too small: • DISADVANTAGE: Acknowledgement will be send by the receiver for every packets. • So , Acknowledgement timer should not be too small or too big. It should be a timer with fixed size. • Timeout timer must be greater than the Acknowledgement timer.
  • 18. Relation between window size and sequence number 3 2 1 0 0 0 1 2 3To 3 0 121 0 1 2 3 2 3 Duplicate packets
  • 19. ADVANTAGES • The sender can send many frames at a time. • Timer can be set for a group of frames. • Only one ACK can acknowledge one or more frames. • Efficiency is more. • Waiting time is pretty low.
  • 20. Points to be remembered • Sender window size is N & N value must be greater than 1 • Receiver window size is always 1 • There are two types of acknowledgement in GBN •Cumulative Acknowledgement •Independent acknowledgement
  翻译: