SlideShare a Scribd company logo
Transport layer protocols:
Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) ,
Selective-Repeat Protocol , Timer , Piggybacking
Simple Protocol
• Use connectionless protocol with neither flow nor error control.
• Assume that the receiver can never be overwhelmed with incoming
packets.
• The sender sends packets one after another without even thinking
about the receiver.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Stop and Wait Protocol
• It is a connection-oriented protocol called the Stop-and-Wait protocol
• which uses both flow and error control
• The sender sends one packet at a time and waits for an acknowledgment before
sending the next one.
• To detect corrupted packets, we need to add a checksum to each data packet.
• When a packet arrives at the receiver site, it is checked. If its checksum is
incorrect, the packet is corrupted and silently discarded.
• the sender can send only one frame at a time and cannot send the next frame
without receiving the acknowledgment of the previously sent frame
Stop and Wait Protocol
• In the method, the sender waits for an acknowledgement after every frame
it sends.
• When acknowledgement is received, then only next frame is sent. The
process of alternately sending and waiting of a frame continues until the
sender transmits the EOT (End of transmission) frame.
• The sender sends a frame and waits for acknowledgment.
• Once the receiver receives the frame, it sends an acknowledgment frame
back to the sender.
• On receiving the acknowledgment frame, the sender understands that the
receiver is ready to accept the next frame. So it sender the next frame in
queue.
Sequence numbers are 0, 1,
0, 1, 0, 1, . . . ;
The acknowledgment
numbers can also be
1, 0, 1, 0, 1, 0, …
In other words,
the sequence numbers
start with 0,
the acknowledgment
numbers start with 1.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Go-Back-N Protocol (GBN)
• the multiple frames can be sent at a time.
• N is the sender's window size.
• Suppose we say that Go-Back-3, which means that the three frames
can be sent at a time before expecting the acknowledgment from the
receiver.
• If the size of the sender's window is 4 then the sequence number will
be 0,1,2,3,0,1,2,3,0,1,2, and so on.
• several data packets and acknowledgments can be in the channel at
the same time.
Working of Go-Back-N ARQ
• Suppose there are a sender and a receiver, and let's assume that there are 11
frames to be sent.
• These frames are represented as 0,1,2,3,4,5,6,7,8,9,10, and these are the
sequence numbers of the frames.
• the sequence number is decided by the sender's window size
Let's assume that the receiver has sent the acknowledgment for the 0 frame,
and the receiver has successfully received it.
The sender will then send the next frame, i.e., 4, and the window slides
containing four frames (1,2,3,4).
The receiver will then send the acknowledgment for the frame no 1.
After receiving the acknowledgment, the sender will send the next frame, i.e.,
frame no 5, and the window will slide having four frames (2,3,4,5).
Now, let's assume that the receiver is not acknowledging the frame no 2,
either the frame is lost, or the acknowledgment is lost.
Instead of sending the frame no 6, the sender Go-Back to 2, which is the first
frame of the current window, retransmits all the frames in the current
window, i.e., 2,3,4,5.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Go back N
• Receiver maintains an acknowledgement timer.
• Each time the receiver receives a new frame, it starts a new
acknowledgement timer.
• After the timer expires, receiver sends the cumulative
acknowledgement for all the frames that are unacknowledged at that
moment.
• A new acknowledgement timer does not start after the expiry of old
acknowledgement timer.
• It starts after a new frame is received.
Important points related to Go-Back-N ARQ:
• In Go-Back-N, N determines the sender's window size, and the size
of the receiver's window is always 1.
• It does not consider the corrupted frames and simply discards
them.
• It does not accept the frames which are out of order and discards
them.
• If the sender does not receive the acknowledgment, it leads to the
retransmission of all the current window frames.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Receive Window
Go-Back-N Protocol (GBN)
• This protocol improves the efficiency of stop and wait protocol by
allowing multiple frames to be transmitted before receiving an
acknowledgment.
• Both the sender and the receiver has finite sized buffers called
windows. The sender and the receiver agrees upon the number of
frames to be sent based upon the buffer size.
• The sender sends multiple frames in a sequence, without waiting for
acknowledgment.
• When its sending window is filled, it waits for acknowledgment. On
receiving acknowledgment, it advances the window and transmits
the next frames, according to the number of acknowledgments
received.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Go-Back-N versus Stop-and-Wait
• The Go-Back-N protocol simplifies the process at the receiver.
• The receiver keeps track of only one variable, and there is no need to
buffer out-of-order packets; they are simply discarded.
• this protocol is inefficient
• Each time a single packet is lost or corrupted, the sender resends all
outstanding packets
Selective-Repeat Protocol
• Selective Repeat attempts to retransmit only those packets that are
actually lost (due to errors)
• In this protocol, the size of the sender window is always equal to the
size of the receiver window.
• If the receiver receives a corrupt frame, it does not directly discard it.
• It sends a negative acknowledgment to the sender.
• The sender sends that frame again as soon as on the receiving
negative acknowledgment. There is no waiting for any time-out to
send that frame.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Timer
•Selective-Repeat uses one timer for each outstanding
packet.
•When a timer expires, only the corresponding packet is
resent.
•GBN treats outstanding packets as a group;
•SR treats them individually.
•However, most transport-layer protocols that implement
SR use only a single timer. For this reason, we use only
one timer.
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
Difference between the Go-Back-N ARQ and Selective Repeat ARQ?
Go-Back-N ARQ Selective Repeat ARQ
If a frame is corrupted or lost in it,
all subsequent frames have to be sent
again.
In this, only the frame is sent again, which is
corrupted or lost.
If it has a high error rate, it wastes a lot
of bandwidth.
There is a loss of low bandwidth.
It is less complex. It is more complex because it has to do sorting
and searching as well. And it also requires more
storage.
Piggybacking
• data packets flow in only one direction and acknowledgments travel
in the other direction.
• In real life, data packets are normally flowing in both directions:
from client to server and from server to client. This means that
acknowledgments also need to flow in both directions. A technique
called piggybacking
• It is used to improve the efficiency of the bidirectional protocols.
• When a packet is carrying data from A to B, it can also carry
acknowledgment feedback about arrived packets from B; when a
packet is carrying data from B to A, it can also carry acknowledgment
feedback about the arrived packets from A
• Piggybacking is a method of attaching acknowledgment to
the outgoing data packet.
Ad

More Related Content

What's hot (20)

Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
selvakumar_b1985
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
STEFFY D
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiseless
Basit Hussain
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
shilpa patel
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
JUW Jinnah University for Women
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
STEFFY D
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiseless
Basit Hussain
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
shilpa patel
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 

Similar to Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking (20)

Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
ManishTadhiyal
 
Flow control main
Flow control mainFlow control main
Flow control main
Nitesh Singh
 
Go back.pptx
Go back.pptxGo back.pptx
Go back.pptx
Mithunkumar91359
 
Computernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptxComputernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptx
DivyaShree999621
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
Inocentshuja Ahmad
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
mqasimsheikh5
 
Flow Control.pptx
Flow Control.pptxFlow Control.pptx
Flow Control.pptx
AshokRachapalli1
 
flow control pptx for computer networking
flow control pptx for computer networkingflow control pptx for computer networking
flow control pptx for computer networking
VijayVishal8
 
Unit2.2- Data Link Control used in data link layer
Unit2.2- Data Link Control used in data link layerUnit2.2- Data Link Control used in data link layer
Unit2.2- Data Link Control used in data link layer
shivanigarv9115
 
computer network - data link control notes
computer network - data link control notescomputer network - data link control notes
computer network - data link control notes
shivanigarv9115
 
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptxLecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
SuhaniTalreja
 
Protocols
ProtocolsProtocols
Protocols
Jyothishmathi Institute of Technology and Science Karimnagar
 
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
gagansaigudi
 
Building a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptxBuilding a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptx
vasanthpadala13
 
Building a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptxBuilding a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptx
vasanthpadala13
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
TejasRao8
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
Shivakrishnan18
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
Diptanshu singh
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
ManishTadhiyal
 
Computernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptxComputernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptx
DivyaShree999621
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
Inocentshuja Ahmad
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
mqasimsheikh5
 
flow control pptx for computer networking
flow control pptx for computer networkingflow control pptx for computer networking
flow control pptx for computer networking
VijayVishal8
 
Unit2.2- Data Link Control used in data link layer
Unit2.2- Data Link Control used in data link layerUnit2.2- Data Link Control used in data link layer
Unit2.2- Data Link Control used in data link layer
shivanigarv9115
 
computer network - data link control notes
computer network - data link control notescomputer network - data link control notes
computer network - data link control notes
shivanigarv9115
 
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptxLecture 36-43_DATA_COMMUNICATION_PPT.pptx
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
SuhaniTalreja
 
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
gagansaigudi
 
Building a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptxBuilding a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptx
vasanthpadala13
 
Building a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptxBuilding a Reliable Data Transfer Protocol.pptx
Building a Reliable Data Transfer Protocol.pptx
vasanthpadala13
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
TejasRao8
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
Shivakrishnan18
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Ad

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Generative AI refers to a subset of artificial intelligence
Introduction to Generative AI refers to a subset of artificial intelligenceIntroduction to Generative AI refers to a subset of artificial intelligence
Introduction to Generative AI refers to a subset of artificial intelligence
Kongu Engineering College, Perundurai, Erode
 
Introduction to Microsoft Power BI is a business analytics service
Introduction to Microsoft Power BI is a business analytics serviceIntroduction to Microsoft Power BI is a business analytics service
Introduction to Microsoft Power BI is a business analytics service
Kongu Engineering College, Perundurai, Erode
 
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Kongu Engineering College, Perundurai, Erode
 
concept of server-side JavaScript / JS Framework: NODEJS
concept of server-side JavaScript / JS Framework: NODEJSconcept of server-side JavaScript / JS Framework: NODEJS
concept of server-side JavaScript / JS Framework: NODEJS
Kongu Engineering College, Perundurai, Erode
 
Node.js web-based Example :Run a local server in order to start using node.js...
Node.js web-based Example :Run a local server in order to start using node.js...Node.js web-based Example :Run a local server in order to start using node.js...
Node.js web-based Example :Run a local server in order to start using node.js...
Kongu Engineering College, Perundurai, Erode
 
Concepts of Satellite Communication and types and its applications
Concepts of Satellite Communication  and types and its applicationsConcepts of Satellite Communication  and types and its applications
Concepts of Satellite Communication and types and its applications
Kongu Engineering College, Perundurai, Erode
 
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLANConcepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Kongu Engineering College, Perundurai, Erode
 
Web Technology Introduction framework.pptx
Web Technology Introduction framework.pptxWeb Technology Introduction framework.pptx
Web Technology Introduction framework.pptx
Kongu Engineering College, Perundurai, Erode
 
Computer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vectorComputer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vector
Kongu Engineering College, Perundurai, Erode
 
Android SQLite database oriented application development
Android SQLite database oriented application developmentAndroid SQLite database oriented application development
Android SQLite database oriented application development
Kongu Engineering College, Perundurai, Erode
 
Android Application Development Programming
Android Application Development ProgrammingAndroid Application Development Programming
Android Application Development Programming
Kongu Engineering College, Perundurai, Erode
 
Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
Kongu Engineering College, Perundurai, Erode
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
Kongu Engineering College, Perundurai, Erode
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
Kongu Engineering College, Perundurai, Erode
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
Kongu Engineering College, Perundurai, Erode
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
Kongu Engineering College, Perundurai, Erode
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
Kongu Engineering College, Perundurai, Erode
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
Kongu Engineering College, Perundurai, Erode
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
Kongu Engineering College, Perundurai, Erode
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
Kongu Engineering College, Perundurai, Erode
 
Ad

Recently uploaded (20)

ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 

Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking

  • 1. Transport layer protocols: Simple Protocol , Stop and Wait Protocol , Go-Back-N Protocol (GBN) , Selective-Repeat Protocol , Timer , Piggybacking
  • 2. Simple Protocol • Use connectionless protocol with neither flow nor error control. • Assume that the receiver can never be overwhelmed with incoming packets. • The sender sends packets one after another without even thinking about the receiver.
  • 4. Stop and Wait Protocol • It is a connection-oriented protocol called the Stop-and-Wait protocol • which uses both flow and error control • The sender sends one packet at a time and waits for an acknowledgment before sending the next one. • To detect corrupted packets, we need to add a checksum to each data packet. • When a packet arrives at the receiver site, it is checked. If its checksum is incorrect, the packet is corrupted and silently discarded. • the sender can send only one frame at a time and cannot send the next frame without receiving the acknowledgment of the previously sent frame
  • 5. Stop and Wait Protocol • In the method, the sender waits for an acknowledgement after every frame it sends. • When acknowledgement is received, then only next frame is sent. The process of alternately sending and waiting of a frame continues until the sender transmits the EOT (End of transmission) frame. • The sender sends a frame and waits for acknowledgment. • Once the receiver receives the frame, it sends an acknowledgment frame back to the sender. • On receiving the acknowledgment frame, the sender understands that the receiver is ready to accept the next frame. So it sender the next frame in queue.
  • 6. Sequence numbers are 0, 1, 0, 1, 0, 1, . . . ; The acknowledgment numbers can also be 1, 0, 1, 0, 1, 0, … In other words, the sequence numbers start with 0, the acknowledgment numbers start with 1.
  • 10. Go-Back-N Protocol (GBN) • the multiple frames can be sent at a time. • N is the sender's window size. • Suppose we say that Go-Back-3, which means that the three frames can be sent at a time before expecting the acknowledgment from the receiver. • If the size of the sender's window is 4 then the sequence number will be 0,1,2,3,0,1,2,3,0,1,2, and so on. • several data packets and acknowledgments can be in the channel at the same time.
  • 11. Working of Go-Back-N ARQ • Suppose there are a sender and a receiver, and let's assume that there are 11 frames to be sent. • These frames are represented as 0,1,2,3,4,5,6,7,8,9,10, and these are the sequence numbers of the frames. • the sequence number is decided by the sender's window size
  • 12. Let's assume that the receiver has sent the acknowledgment for the 0 frame, and the receiver has successfully received it.
  • 13. The sender will then send the next frame, i.e., 4, and the window slides containing four frames (1,2,3,4).
  • 14. The receiver will then send the acknowledgment for the frame no 1. After receiving the acknowledgment, the sender will send the next frame, i.e., frame no 5, and the window will slide having four frames (2,3,4,5).
  • 15. Now, let's assume that the receiver is not acknowledging the frame no 2, either the frame is lost, or the acknowledgment is lost. Instead of sending the frame no 6, the sender Go-Back to 2, which is the first frame of the current window, retransmits all the frames in the current window, i.e., 2,3,4,5.
  • 17. Go back N • Receiver maintains an acknowledgement timer. • Each time the receiver receives a new frame, it starts a new acknowledgement timer. • After the timer expires, receiver sends the cumulative acknowledgement for all the frames that are unacknowledged at that moment. • A new acknowledgement timer does not start after the expiry of old acknowledgement timer. • It starts after a new frame is received.
  • 18. Important points related to Go-Back-N ARQ: • In Go-Back-N, N determines the sender's window size, and the size of the receiver's window is always 1. • It does not consider the corrupted frames and simply discards them. • It does not accept the frames which are out of order and discards them. • If the sender does not receive the acknowledgment, it leads to the retransmission of all the current window frames.
  • 22. Go-Back-N Protocol (GBN) • This protocol improves the efficiency of stop and wait protocol by allowing multiple frames to be transmitted before receiving an acknowledgment. • Both the sender and the receiver has finite sized buffers called windows. The sender and the receiver agrees upon the number of frames to be sent based upon the buffer size. • The sender sends multiple frames in a sequence, without waiting for acknowledgment. • When its sending window is filled, it waits for acknowledgment. On receiving acknowledgment, it advances the window and transmits the next frames, according to the number of acknowledgments received.
  • 26. Go-Back-N versus Stop-and-Wait • The Go-Back-N protocol simplifies the process at the receiver. • The receiver keeps track of only one variable, and there is no need to buffer out-of-order packets; they are simply discarded. • this protocol is inefficient • Each time a single packet is lost or corrupted, the sender resends all outstanding packets
  • 27. Selective-Repeat Protocol • Selective Repeat attempts to retransmit only those packets that are actually lost (due to errors) • In this protocol, the size of the sender window is always equal to the size of the receiver window. • If the receiver receives a corrupt frame, it does not directly discard it. • It sends a negative acknowledgment to the sender. • The sender sends that frame again as soon as on the receiving negative acknowledgment. There is no waiting for any time-out to send that frame.
  • 29. Timer •Selective-Repeat uses one timer for each outstanding packet. •When a timer expires, only the corresponding packet is resent. •GBN treats outstanding packets as a group; •SR treats them individually. •However, most transport-layer protocols that implement SR use only a single timer. For this reason, we use only one timer.
  • 31. Difference between the Go-Back-N ARQ and Selective Repeat ARQ? Go-Back-N ARQ Selective Repeat ARQ If a frame is corrupted or lost in it, all subsequent frames have to be sent again. In this, only the frame is sent again, which is corrupted or lost. If it has a high error rate, it wastes a lot of bandwidth. There is a loss of low bandwidth. It is less complex. It is more complex because it has to do sorting and searching as well. And it also requires more storage.
  • 32. Piggybacking • data packets flow in only one direction and acknowledgments travel in the other direction. • In real life, data packets are normally flowing in both directions: from client to server and from server to client. This means that acknowledgments also need to flow in both directions. A technique called piggybacking • It is used to improve the efficiency of the bidirectional protocols. • When a packet is carrying data from A to B, it can also carry acknowledgment feedback about arrived packets from B; when a packet is carrying data from B to A, it can also carry acknowledgment feedback about the arrived packets from A
  • 33. • Piggybacking is a method of attaching acknowledgment to the outgoing data packet.
  翻译: