SlideShare a Scribd company logo
1 of 22
DATA COMMUNICATIONS &
NETWORKING
LECTURE-
24
Course Instructor : Sehrish Rafiq
Department Of Computer Science
University Of Peshawar
LECTURE OVERVIEW
 Go-Back N-ARQ
 Selective Repeat ARQ
GO-BACK-N ARQ
&
SELECTIVE- REPEAT-ARQ
 To improve the efficiency, multiple frames should
be in-transition while waiting for
acknowledgement.
 Go-Back N-ARQ
 Selective Repeat ARQ
GO-BACK N-ARQ
 In Go-Back N-ARQ ,we can send W frames before
worrying about acknowledgements.
 We keep a copy of these frames until an
acknowledgement arrive.
SEQUENCE NUMBERS
 Frames from a sending station are numbered
sequentially.
 sequence number is included in the header ,we
need to set a limit.
 If the header of the frame allows m bits for the
sequence number the sequence number range
from 0 to 2m
-1.
 E.g.
 For m=3 the sequence numbers would be 0 to 7.
 However we can repeat the sequence.
SENDER SLIDING WINDOW
 At the sender site to hold the outstanding frames
until they are acknowledged we use the concept
of a window.
 We imagine that all frames are stored in a
buffer.
 The outstanding frames are enclosed in a
window.
 The frames to the left of the window are those
that have already being acknowledged.
SENDER SLIDING WINDOW
 Those to the right of the window cannot be sent
before the window slides over them.
 The size of the window is at most 2m
-1.
 The size of this window is fixed.
 The window slides to include new unsent frames
when correct acknowledgements are received.
SENDER SLIDING WINDOW
RECEIVER SLIDING WINDOW
 The size of the window at the receiver site in this
protocol is 1.
 The receiver is always looking for a specific frame
to arrive in a specific order.
 Any frame arriving out of order is discarded and
needs to be resent.
 The receiver window also slides .
RECEIVER WINDOW
CONTROL VARIABLES
 The sender has three variables , S, SF and SL.
 The S variable holds the sequence number of the
recently sent frame.
 SF holds the sequence number of the first frame of
the window.
 SL holds the sequence number of the last frame of
the window.
 The size of the window is W= SL - SF +1.
 The receiver only has one variable R holding the
sequence number of the frame it expects to
receive.
CONTROL VARIABLES CONT…
 If the sequence number of the received frame is
the same as the value of R, the frame is accepted,
if not it is rejected.
TIMERS
 The sender sets a timer for each frame sent.
 The receiver has no timers.
ACKNOWLEDGEMENT
 The receiver sends positive acknowledgements if
a frame has arrived safe and sound and in order.
 If a frame is damaged or is received out of
order ,the receiver is silent and will discard all
subsequent frames until it receives the one it is
expecting .
 The silence of the receiver causes the timer of the
unacknowledged frame to expire.
 This in turn causes the sender to go back and
resend all frames beginning one with the expired
timer.
GO-BACK-N-ARQ NORMAL
OPERATION
DAMAGED OR LOST FRAME
DAMAGED OR LOST
ACKNOWLEDGEMENT
 If an acknowledgement is damaged or lost we can
have two situations.
 If the next acknowledgement arrives before the
expiration of any timer there is no need for
retransmission of frames because
acknowledgements are cumulative in this
protocol.
 However if the next ACK arrives after the
timeout, the frame and all the frames after that
are resent.
 The receiver never resends an ACK.
SELECTIVE REPEAT ARQ
 Go-Back-N-ARQ protocol is very inefficient for a
noisy link.
 In a noisy link a frame has a high probability of
damage, which means the resending of multiple
frames.
 This resending uses up the bandwidth and slows
down the transmission.
 For noisy links there is another mechanism that
does not resend N frames when just one frame is
damaged, only the damaged frame is resent.
 This mechanism is called Selective-Repeat-ARQ.
SENDER AND RECEIVER
WINDOWS
 The configuration of the sender and its control
variables for Selective-Repeat ARQ are the same
as for Go-Back-N ARQ.
 However, the size of the window should be at
most one half of the value 2m
.
 The receiver window must have the same size.
 This window however specifies the range of the
accepted received frame.
 In selective –Repeat ARQ the receiver is looking
for a range of sequence numbers.
CONTROL VARIABLES
 The receiver has two control variables RF and RL
to define the boundaries of the window.
SELECTIVE REPEAT ARQ, LOST
FRAME
THANKS!!!

More Related Content

What's hot

Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellKundan Kumar
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniquesSathish Kumar
 
UNIT-I-RTOS and Concepts
UNIT-I-RTOS and ConceptsUNIT-I-RTOS and Concepts
UNIT-I-RTOS and ConceptsDr.YNM
 
DPSK(Differential Phase Shift Keying) transmitter and receiver
DPSK(Differential Phase Shift Keying) transmitter and receiverDPSK(Differential Phase Shift Keying) transmitter and receiver
DPSK(Differential Phase Shift Keying) transmitter and receiverSumukh Athrey
 
M ary psk modulation
M ary psk modulationM ary psk modulation
M ary psk modulationAhmed Diaa
 
Companding & Pulse Code Modulation
Companding & Pulse Code ModulationCompanding & Pulse Code Modulation
Companding & Pulse Code ModulationYeshudas Muttu
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE ShivangiSingh241
 
Forward error correction
Forward error correctionForward error correction
Forward error correctionPrankit Mishra
 
Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...
Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...
Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...Waqas Afzal
 
QUANTIZATION ERROR AND NOISE
QUANTIZATION ERROR AND NOISEQUANTIZATION ERROR AND NOISE
QUANTIZATION ERROR AND NOISEVIT VELLORE
 
CMOS Fabrication using P-well -VLSI
CMOS Fabrication  using P-well -VLSICMOS Fabrication  using P-well -VLSI
CMOS Fabrication using P-well -VLSINITHIN KALLE PALLY
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingNaveen Jakhar, I.T.S
 

What's hot (20)

carrier synchronization
carrier synchronizationcarrier synchronization
carrier synchronization
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 
Synchronization
SynchronizationSynchronization
Synchronization
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
 
UNIT-I-RTOS and Concepts
UNIT-I-RTOS and ConceptsUNIT-I-RTOS and Concepts
UNIT-I-RTOS and Concepts
 
DPSK(Differential Phase Shift Keying) transmitter and receiver
DPSK(Differential Phase Shift Keying) transmitter and receiverDPSK(Differential Phase Shift Keying) transmitter and receiver
DPSK(Differential Phase Shift Keying) transmitter and receiver
 
M ary psk modulation
M ary psk modulationM ary psk modulation
M ary psk modulation
 
Companding & Pulse Code Modulation
Companding & Pulse Code ModulationCompanding & Pulse Code Modulation
Companding & Pulse Code Modulation
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
 
Token ring
Token ringToken ring
Token ring
 
Turbo codes.ppt
Turbo codes.pptTurbo codes.ppt
Turbo codes.ppt
 
Forward error correction
Forward error correctionForward error correction
Forward error correction
 
Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...
Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...
Sampling Theorem, Quantization Noise and its types, PCM, Channel Capacity, Ny...
 
Error correction, ARQ, FEC
Error correction, ARQ, FECError correction, ARQ, FEC
Error correction, ARQ, FEC
 
QUANTIZATION ERROR AND NOISE
QUANTIZATION ERROR AND NOISEQUANTIZATION ERROR AND NOISE
QUANTIZATION ERROR AND NOISE
 
CMOS Fabrication using P-well -VLSI
CMOS Fabrication  using P-well -VLSICMOS Fabrication  using P-well -VLSI
CMOS Fabrication using P-well -VLSI
 
Guided media
Guided mediaGuided media
Guided media
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
 

Viewers also liked

Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01 Sehrish Rafiq
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication samanthaanderson21
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)Twist Akid Sultan
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...
A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...
A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...CSCJournals
 
Behavioral modeling of Clock/Data Recovery
Behavioral modeling of Clock/Data RecoveryBehavioral modeling of Clock/Data Recovery
Behavioral modeling of Clock/Data RecoveryArrow Devices
 

Viewers also liked (20)

Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...
A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...
A Stochastic Model Approach for Reaching Probabilities of Message Flow in Spa...
 
Behavioral modeling of Clock/Data Recovery
Behavioral modeling of Clock/Data RecoveryBehavioral modeling of Clock/Data Recovery
Behavioral modeling of Clock/Data Recovery
 
Lecture 23
Lecture 23Lecture 23
Lecture 23
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 

Similar to Go-Back N and Selective Repeat ARQ Protocols

Similar to Go-Back N and Selective Repeat ARQ Protocols (20)

session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptsession -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
 
PROTOCOL ICT.pptx
PROTOCOL ICT.pptxPROTOCOL ICT.pptx
PROTOCOL ICT.pptx
 
Protocols
ProtocolsProtocols
Protocols
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
 
Flow control main
Flow control mainFlow control main
Flow control main
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
Arq protocol part 2
Arq protocol part 2Arq protocol part 2
Arq protocol part 2
 
Flowctrl
FlowctrlFlowctrl
Flowctrl
 
Micro project on ARQ
Micro project on ARQMicro project on ARQ
Micro project on ARQ
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 
Data linkcontrol
Data linkcontrolData linkcontrol
Data linkcontrol
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 

More from Sehrish Rafiq (16)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Go-Back N and Selective Repeat ARQ Protocols

  • 1. DATA COMMUNICATIONS & NETWORKING LECTURE- 24 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. LECTURE OVERVIEW  Go-Back N-ARQ  Selective Repeat ARQ
  • 3. GO-BACK-N ARQ & SELECTIVE- REPEAT-ARQ  To improve the efficiency, multiple frames should be in-transition while waiting for acknowledgement.  Go-Back N-ARQ  Selective Repeat ARQ
  • 4. GO-BACK N-ARQ  In Go-Back N-ARQ ,we can send W frames before worrying about acknowledgements.  We keep a copy of these frames until an acknowledgement arrive.
  • 5. SEQUENCE NUMBERS  Frames from a sending station are numbered sequentially.  sequence number is included in the header ,we need to set a limit.  If the header of the frame allows m bits for the sequence number the sequence number range from 0 to 2m -1.  E.g.  For m=3 the sequence numbers would be 0 to 7.  However we can repeat the sequence.
  • 6. SENDER SLIDING WINDOW  At the sender site to hold the outstanding frames until they are acknowledged we use the concept of a window.  We imagine that all frames are stored in a buffer.  The outstanding frames are enclosed in a window.  The frames to the left of the window are those that have already being acknowledged.
  • 7. SENDER SLIDING WINDOW  Those to the right of the window cannot be sent before the window slides over them.  The size of the window is at most 2m -1.  The size of this window is fixed.  The window slides to include new unsent frames when correct acknowledgements are received.
  • 9. RECEIVER SLIDING WINDOW  The size of the window at the receiver site in this protocol is 1.  The receiver is always looking for a specific frame to arrive in a specific order.  Any frame arriving out of order is discarded and needs to be resent.  The receiver window also slides .
  • 11. CONTROL VARIABLES  The sender has three variables , S, SF and SL.  The S variable holds the sequence number of the recently sent frame.  SF holds the sequence number of the first frame of the window.  SL holds the sequence number of the last frame of the window.  The size of the window is W= SL - SF +1.  The receiver only has one variable R holding the sequence number of the frame it expects to receive.
  • 12. CONTROL VARIABLES CONT…  If the sequence number of the received frame is the same as the value of R, the frame is accepted, if not it is rejected.
  • 13. TIMERS  The sender sets a timer for each frame sent.  The receiver has no timers.
  • 14. ACKNOWLEDGEMENT  The receiver sends positive acknowledgements if a frame has arrived safe and sound and in order.  If a frame is damaged or is received out of order ,the receiver is silent and will discard all subsequent frames until it receives the one it is expecting .  The silence of the receiver causes the timer of the unacknowledged frame to expire.  This in turn causes the sender to go back and resend all frames beginning one with the expired timer.
  • 17. DAMAGED OR LOST ACKNOWLEDGEMENT  If an acknowledgement is damaged or lost we can have two situations.  If the next acknowledgement arrives before the expiration of any timer there is no need for retransmission of frames because acknowledgements are cumulative in this protocol.  However if the next ACK arrives after the timeout, the frame and all the frames after that are resent.  The receiver never resends an ACK.
  • 18. SELECTIVE REPEAT ARQ  Go-Back-N-ARQ protocol is very inefficient for a noisy link.  In a noisy link a frame has a high probability of damage, which means the resending of multiple frames.  This resending uses up the bandwidth and slows down the transmission.  For noisy links there is another mechanism that does not resend N frames when just one frame is damaged, only the damaged frame is resent.  This mechanism is called Selective-Repeat-ARQ.
  • 19. SENDER AND RECEIVER WINDOWS  The configuration of the sender and its control variables for Selective-Repeat ARQ are the same as for Go-Back-N ARQ.  However, the size of the window should be at most one half of the value 2m .  The receiver window must have the same size.  This window however specifies the range of the accepted received frame.  In selective –Repeat ARQ the receiver is looking for a range of sequence numbers.
  • 20. CONTROL VARIABLES  The receiver has two control variables RF and RL to define the boundaries of the window.
  • 21. SELECTIVE REPEAT ARQ, LOST FRAME