SlideShare a Scribd company logo
1 of 4
Download to read offline
1     Sliding Window Protocol
A sliding window protocol is a feature of Packet based data transmission
protocols. They are used where reliability in order to delivery of packets
is required, such as in data link layer as in the transmission control proto-
col(TCP).

1.1   Features
Each position of the transmission (Packets) is assigned a unique consecutive
sequence number and the receiver uses the numbers to place received packets
in the correct order. i.e.

    • Discarding duplicate packets.

    • Identifying missing packets.

1.2   Problem
There is no limit of the size or sequence numbers that can be required in
this protocol.

1.3   Approach to the Problem
This problem can be chacked by placing a limit on the number of packets
that can be transmitted or received at any given time.

1.4   Merits
A sliding window protocol allows an unlimited numbers of packets to be
communicated using fixed sequence numbers.

1.5   Alertness
For highest possible throughput, it is important that the transmitter is not
permitted to stop sending by the sliding window protocol earlier than one
Round Trip Delay Time(RTT).
RTT: It is the length of time it takes for a signal to be sent plus the length
of time it takes for an acknowledge of that signal to be received.
RTT = SendTime + AckTime


2     Protocol based Communication
In communication based protocol , the receiver must acknowledge received
packets. If transmitter does not receive an acknowledgement within a rea-
sonable time, it resends data.

                                      1
If a transmitter does not receive an acknowledgement it cannot know whether
actually receiver received the packet or not, or packet was damaged or it
may also happen that acknowledgement was sent but it was lost.


3     Protocol Operation
Basic terms used in it are -
    • Transmitter sequence number = n(t)

    • Receiver sequence number = n(r)

    • Transmitter window size = w(t)

    • Receiver window size = w(r)
Window size must be greater than Zero. As we mentioned , n(t) is the next
packet to be transmitted and the sequence number of this packet is not yet
received and n(r) is the first packet not yet received. These both numbers
are in increasing mode.


3.1     Receiver Operation
n(s) is one more than the sequence number of the highest sequence number
received.
    • Received a Packet

    • Updates its Variable

    • Transmit acknowledgement with the new n(r)

    • Transmitter keeps track of the highest acknowledgement it has received
      n(a)
But it is uncertain about the packets n(a) and n(s).


n(a)<= n(r)<= n(s)

3.1.1    Some Facts
There are some facts that are listed below -
    • The highest acknowledgement received by the transmitter cannot be
      higher than the highest acknowledged by the receiver.

        n(a)<= n(r)

                                     2
• The span of fully received packets cannot extend beyond the end of
     the partially received packet.


      n(r)<=n(s).

   • The highest packet received cannot be higher than the highest packet
     send.

      n(s)<=n(t)

   • The highest packet sent is limited by the highest acknowledgement
     received and the transmit window size.

      n(t)<=n(a) +w(t)

3.2   Transmitter Operation
If transmitter wants to send data, it may transmit upto w(t) packets ahead
of the latest acknowledgement n(a). A transmitter can send packet number
n(t) if and only if

n(t) < n(a) +w(t)

3.3   Benefit of Sliding Window Protocol
Some benefits of sliding window protocol -

   • Data Reliability

   • Data Integrity

   • Unlimited Sequence numbers are used


      3.4   Drawback of Sliding Window Protocol

   • Ambiguity occurs

   • Maintaining a Sequence number is difficult




                                    3
Figure 1: Our proposed Architecture



4    Connectionless Communication in Data Link Layer
Packet switching network (connectionless network) is a data transmission
method in which each data packet carries some information. The connec-
tionless communication mode has advantages over connection oriented com-
munication. It allows multihop also in Data link layer.
The data link layer supports reliable packet transmission between node to
node wireless connection. The sliding window protocol supports the reliable
data communication in data link layer. In our architecture all reliable datas
are going to upper layer which ensures there is no missing of data.


5    Conclusion
In our proposed architecture we mentioned how data can be sent with in-
tegrity and reliablity as we want reliable communication in multihop routing.
As data is very important and valuable, if we lose data then it has a great
impact on a persons condition and also has some environmental influences.

    • So our proposed architecture refers Safety Critical Ad - Hoc routing
      Architecture.



                                     4

More Related Content

What's hot

Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiselessBasit Hussain
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow controlSushant Kushwaha
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocolsNitesh Singh
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eadpeer
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCPselvakumar_b1985
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCPselvakumar_b1985
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLShashank Rustagi
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithmUmesh Gupta
 
14 data link control
14 data link control14 data link control
14 data link controlarvindsarja
 

What's hot (20)

Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiseless
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCP
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
14 data link control
14 data link control14 data link control
14 data link control
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 

Similar to Sliding window protocol

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdfShanthalaKV
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxBHAVYPATEL34
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdfADARSHN40
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxElectro00
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocolSundra Anand
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 

Similar to Sliding window protocol (20)

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
Data link layer (Unit 2).pdf
Data link layer (Unit 2).pdfData link layer (Unit 2).pdf
Data link layer (Unit 2).pdf
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
transport.pdf
transport.pdftransport.pdf
transport.pdf
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptx
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 

More from Rishu Seth

Role of Testing
Role of Testing Role of Testing
Role of Testing Rishu Seth
 
Simulation of insulin pump
Simulation of insulin pump Simulation of insulin pump
Simulation of insulin pump Rishu Seth
 
ATCM presentation
ATCM presentationATCM presentation
ATCM presentationRishu Seth
 
Topo intro wsn
Topo intro wsnTopo intro wsn
Topo intro wsnRishu Seth
 
Energy control wsn
Energy control wsnEnergy control wsn
Energy control wsnRishu Seth
 
Wsn topologies intro
Wsn topologies introWsn topologies intro
Wsn topologies introRishu Seth
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning projectRishu Seth
 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commandsRishu Seth
 
Air traffic control
Air traffic controlAir traffic control
Air traffic controlRishu Seth
 

More from Rishu Seth (13)

Role of Testing
Role of Testing Role of Testing
Role of Testing
 
MicazXpl
MicazXplMicazXpl
MicazXpl
 
Simulation of insulin pump
Simulation of insulin pump Simulation of insulin pump
Simulation of insulin pump
 
ATCM presentation
ATCM presentationATCM presentation
ATCM presentation
 
Topo intro wsn
Topo intro wsnTopo intro wsn
Topo intro wsn
 
Micazxpl wsn
Micazxpl wsnMicazxpl wsn
Micazxpl wsn
 
Mts srcp
Mts srcpMts srcp
Mts srcp
 
Energy control wsn
Energy control wsnEnergy control wsn
Energy control wsn
 
Wsn topologies intro
Wsn topologies introWsn topologies intro
Wsn topologies intro
 
Rssi report
Rssi reportRssi report
Rssi report
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commands
 
Air traffic control
Air traffic controlAir traffic control
Air traffic control
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Sliding window protocol

  • 1. 1 Sliding Window Protocol A sliding window protocol is a feature of Packet based data transmission protocols. They are used where reliability in order to delivery of packets is required, such as in data link layer as in the transmission control proto- col(TCP). 1.1 Features Each position of the transmission (Packets) is assigned a unique consecutive sequence number and the receiver uses the numbers to place received packets in the correct order. i.e. • Discarding duplicate packets. • Identifying missing packets. 1.2 Problem There is no limit of the size or sequence numbers that can be required in this protocol. 1.3 Approach to the Problem This problem can be chacked by placing a limit on the number of packets that can be transmitted or received at any given time. 1.4 Merits A sliding window protocol allows an unlimited numbers of packets to be communicated using fixed sequence numbers. 1.5 Alertness For highest possible throughput, it is important that the transmitter is not permitted to stop sending by the sliding window protocol earlier than one Round Trip Delay Time(RTT). RTT: It is the length of time it takes for a signal to be sent plus the length of time it takes for an acknowledge of that signal to be received. RTT = SendTime + AckTime 2 Protocol based Communication In communication based protocol , the receiver must acknowledge received packets. If transmitter does not receive an acknowledgement within a rea- sonable time, it resends data. 1
  • 2. If a transmitter does not receive an acknowledgement it cannot know whether actually receiver received the packet or not, or packet was damaged or it may also happen that acknowledgement was sent but it was lost. 3 Protocol Operation Basic terms used in it are - • Transmitter sequence number = n(t) • Receiver sequence number = n(r) • Transmitter window size = w(t) • Receiver window size = w(r) Window size must be greater than Zero. As we mentioned , n(t) is the next packet to be transmitted and the sequence number of this packet is not yet received and n(r) is the first packet not yet received. These both numbers are in increasing mode. 3.1 Receiver Operation n(s) is one more than the sequence number of the highest sequence number received. • Received a Packet • Updates its Variable • Transmit acknowledgement with the new n(r) • Transmitter keeps track of the highest acknowledgement it has received n(a) But it is uncertain about the packets n(a) and n(s). n(a)<= n(r)<= n(s) 3.1.1 Some Facts There are some facts that are listed below - • The highest acknowledgement received by the transmitter cannot be higher than the highest acknowledged by the receiver. n(a)<= n(r) 2
  • 3. • The span of fully received packets cannot extend beyond the end of the partially received packet. n(r)<=n(s). • The highest packet received cannot be higher than the highest packet send. n(s)<=n(t) • The highest packet sent is limited by the highest acknowledgement received and the transmit window size. n(t)<=n(a) +w(t) 3.2 Transmitter Operation If transmitter wants to send data, it may transmit upto w(t) packets ahead of the latest acknowledgement n(a). A transmitter can send packet number n(t) if and only if n(t) < n(a) +w(t) 3.3 Benefit of Sliding Window Protocol Some benefits of sliding window protocol - • Data Reliability • Data Integrity • Unlimited Sequence numbers are used 3.4 Drawback of Sliding Window Protocol • Ambiguity occurs • Maintaining a Sequence number is difficult 3
  • 4. Figure 1: Our proposed Architecture 4 Connectionless Communication in Data Link Layer Packet switching network (connectionless network) is a data transmission method in which each data packet carries some information. The connec- tionless communication mode has advantages over connection oriented com- munication. It allows multihop also in Data link layer. The data link layer supports reliable packet transmission between node to node wireless connection. The sliding window protocol supports the reliable data communication in data link layer. In our architecture all reliable datas are going to upper layer which ensures there is no missing of data. 5 Conclusion In our proposed architecture we mentioned how data can be sent with in- tegrity and reliablity as we want reliable communication in multihop routing. As data is very important and valuable, if we lose data then it has a great impact on a persons condition and also has some environmental influences. • So our proposed architecture refers Safety Critical Ad - Hoc routing Architecture. 4