SlideShare a Scribd company logo
1 of 4
Download to read offline
1     Sliding Window Protocol
A sliding window protocol is a feature of Packet based data transmission
protocols. They are used where reliability in order to delivery of packets
is required, such as in data link layer as in the transmission control proto-
col(TCP).

1.1   Features
Each position of the transmission (Packets) is assigned a unique consecutive
sequence number and the receiver uses the numbers to place received packets
in the correct order. i.e.

    • Discarding duplicate packets.

    • Identifying missing packets.

1.2   Problem
There is no limit of the size or sequence numbers that can be required in
this protocol.

1.3   Approach to the Problem
This problem can be chacked by placing a limit on the number of packets
that can be transmitted or received at any given time.

1.4   Merits
A sliding window protocol allows an unlimited numbers of packets to be
communicated using fixed sequence numbers.

1.5   Alertness
For highest possible throughput, it is important that the transmitter is not
permitted to stop sending by the sliding window protocol earlier than one
Round Trip Delay Time(RTT).
RTT: It is the length of time it takes for a signal to be sent plus the length
of time it takes for an acknowledge of that signal to be received.
RTT = SendTime + AckTime


2     Protocol based Communication
In communication based protocol , the receiver must acknowledge received
packets. If transmitter does not receive an acknowledgement within a rea-
sonable time, it resends data.

                                      1
If a transmitter does not receive an acknowledgement it cannot know whether
actually receiver received the packet or not, or packet was damaged or it
may also happen that acknowledgement was sent but it was lost.


3     Protocol Operation
Basic terms used in it are -
    • Transmitter sequence number = n(t)

    • Receiver sequence number = n(r)

    • Transmitter window size = w(t)

    • Receiver window size = w(r)
Window size must be greater than Zero. As we mentioned , n(t) is the next
packet to be transmitted and the sequence number of this packet is not yet
received and n(r) is the first packet not yet received. These both numbers
are in increasing mode.


3.1     Receiver Operation
n(s) is one more than the sequence number of the highest sequence number
received.
    • Received a Packet

    • Updates its Variable

    • Transmit acknowledgement with the new n(r)

    • Transmitter keeps track of the highest acknowledgement it has received
      n(a)
But it is uncertain about the packets n(a) and n(s).


n(a)<= n(r)<= n(s)

3.1.1    Some Facts
There are some facts that are listed below -
    • The highest acknowledgement received by the transmitter cannot be
      higher than the highest acknowledged by the receiver.

        n(a)<= n(r)

                                     2
• The span of fully received packets cannot extend beyond the end of
     the partially received packet.


      n(r)<=n(s).

   • The highest packet received cannot be higher than the highest packet
     send.

      n(s)<=n(t)

   • The highest packet sent is limited by the highest acknowledgement
     received and the transmit window size.

      n(t)<=n(a) +w(t)

3.2   Transmitter Operation
If transmitter wants to send data, it may transmit upto w(t) packets ahead
of the latest acknowledgement n(a). A transmitter can send packet number
n(t) if and only if

n(t) < n(a) +w(t)

3.3   Benefit of Sliding Window Protocol
Some benefits of sliding window protocol -

   • Data Reliability

   • Data Integrity

   • Unlimited Sequence numbers are used


      3.4   Drawback of Sliding Window Protocol

   • Ambiguity occurs

   • Maintaining a Sequence number is difficult




                                    3
Figure 1: Our proposed Architecture



4    Connectionless Communication in Data Link Layer
Packet switching network (connectionless network) is a data transmission
method in which each data packet carries some information. The connec-
tionless communication mode has advantages over connection oriented com-
munication. It allows multihop also in Data link layer.
The data link layer supports reliable packet transmission between node to
node wireless connection. The sliding window protocol supports the reliable
data communication in data link layer. In our architecture all reliable datas
are going to upper layer which ensures there is no missing of data.


5    Conclusion
In our proposed architecture we mentioned how data can be sent with in-
tegrity and reliablity as we want reliable communication in multihop routing.
As data is very important and valuable, if we lose data then it has a great
impact on a persons condition and also has some environmental influences.

    • So our proposed architecture refers Safety Critical Ad - Hoc routing
      Architecture.



                                     4

More Related Content

What's hot

Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiselessBasit Hussain
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow controlSushant Kushwaha
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocolsNitesh Singh
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eadpeer
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCPselvakumar_b1985
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCPselvakumar_b1985
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLShashank Rustagi
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithmUmesh Gupta
 
14 data link control
14 data link control14 data link control
14 data link controlarvindsarja
 

What's hot (20)

Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Protocols of noiseless
Protocols of noiselessProtocols of noiseless
Protocols of noiseless
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCP
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
14 data link control
14 data link control14 data link control
14 data link control
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 

Similar to Sliding window protocol

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdfShanthalaKV
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxBHAVYPATEL34
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdfADARSHN40
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxElectro00
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocolSundra Anand
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 

Similar to Sliding window protocol (20)

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
Data link layer (Unit 2).pdf
Data link layer (Unit 2).pdfData link layer (Unit 2).pdf
Data link layer (Unit 2).pdf
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
transport.pdf
transport.pdftransport.pdf
transport.pdf
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptx
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 

More from Rishu Seth

Role of Testing
Role of Testing Role of Testing
Role of Testing Rishu Seth
 
Simulation of insulin pump
Simulation of insulin pump Simulation of insulin pump
Simulation of insulin pump Rishu Seth
 
ATCM presentation
ATCM presentationATCM presentation
ATCM presentationRishu Seth
 
Topo intro wsn
Topo intro wsnTopo intro wsn
Topo intro wsnRishu Seth
 
Energy control wsn
Energy control wsnEnergy control wsn
Energy control wsnRishu Seth
 
Wsn topologies intro
Wsn topologies introWsn topologies intro
Wsn topologies introRishu Seth
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning projectRishu Seth
 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commandsRishu Seth
 
Air traffic control
Air traffic controlAir traffic control
Air traffic controlRishu Seth
 

More from Rishu Seth (13)

Role of Testing
Role of Testing Role of Testing
Role of Testing
 
MicazXpl
MicazXplMicazXpl
MicazXpl
 
Simulation of insulin pump
Simulation of insulin pump Simulation of insulin pump
Simulation of insulin pump
 
ATCM presentation
ATCM presentationATCM presentation
ATCM presentation
 
Topo intro wsn
Topo intro wsnTopo intro wsn
Topo intro wsn
 
Micazxpl wsn
Micazxpl wsnMicazxpl wsn
Micazxpl wsn
 
Mts srcp
Mts srcpMts srcp
Mts srcp
 
Energy control wsn
Energy control wsnEnergy control wsn
Energy control wsn
 
Wsn topologies intro
Wsn topologies introWsn topologies intro
Wsn topologies intro
 
Rssi report
Rssi reportRssi report
Rssi report
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commands
 
Air traffic control
Air traffic controlAir traffic control
Air traffic control
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Sliding window protocol

  • 1. 1 Sliding Window Protocol A sliding window protocol is a feature of Packet based data transmission protocols. They are used where reliability in order to delivery of packets is required, such as in data link layer as in the transmission control proto- col(TCP). 1.1 Features Each position of the transmission (Packets) is assigned a unique consecutive sequence number and the receiver uses the numbers to place received packets in the correct order. i.e. • Discarding duplicate packets. • Identifying missing packets. 1.2 Problem There is no limit of the size or sequence numbers that can be required in this protocol. 1.3 Approach to the Problem This problem can be chacked by placing a limit on the number of packets that can be transmitted or received at any given time. 1.4 Merits A sliding window protocol allows an unlimited numbers of packets to be communicated using fixed sequence numbers. 1.5 Alertness For highest possible throughput, it is important that the transmitter is not permitted to stop sending by the sliding window protocol earlier than one Round Trip Delay Time(RTT). RTT: It is the length of time it takes for a signal to be sent plus the length of time it takes for an acknowledge of that signal to be received. RTT = SendTime + AckTime 2 Protocol based Communication In communication based protocol , the receiver must acknowledge received packets. If transmitter does not receive an acknowledgement within a rea- sonable time, it resends data. 1
  • 2. If a transmitter does not receive an acknowledgement it cannot know whether actually receiver received the packet or not, or packet was damaged or it may also happen that acknowledgement was sent but it was lost. 3 Protocol Operation Basic terms used in it are - • Transmitter sequence number = n(t) • Receiver sequence number = n(r) • Transmitter window size = w(t) • Receiver window size = w(r) Window size must be greater than Zero. As we mentioned , n(t) is the next packet to be transmitted and the sequence number of this packet is not yet received and n(r) is the first packet not yet received. These both numbers are in increasing mode. 3.1 Receiver Operation n(s) is one more than the sequence number of the highest sequence number received. • Received a Packet • Updates its Variable • Transmit acknowledgement with the new n(r) • Transmitter keeps track of the highest acknowledgement it has received n(a) But it is uncertain about the packets n(a) and n(s). n(a)<= n(r)<= n(s) 3.1.1 Some Facts There are some facts that are listed below - • The highest acknowledgement received by the transmitter cannot be higher than the highest acknowledged by the receiver. n(a)<= n(r) 2
  • 3. • The span of fully received packets cannot extend beyond the end of the partially received packet. n(r)<=n(s). • The highest packet received cannot be higher than the highest packet send. n(s)<=n(t) • The highest packet sent is limited by the highest acknowledgement received and the transmit window size. n(t)<=n(a) +w(t) 3.2 Transmitter Operation If transmitter wants to send data, it may transmit upto w(t) packets ahead of the latest acknowledgement n(a). A transmitter can send packet number n(t) if and only if n(t) < n(a) +w(t) 3.3 Benefit of Sliding Window Protocol Some benefits of sliding window protocol - • Data Reliability • Data Integrity • Unlimited Sequence numbers are used 3.4 Drawback of Sliding Window Protocol • Ambiguity occurs • Maintaining a Sequence number is difficult 3
  • 4. Figure 1: Our proposed Architecture 4 Connectionless Communication in Data Link Layer Packet switching network (connectionless network) is a data transmission method in which each data packet carries some information. The connec- tionless communication mode has advantages over connection oriented com- munication. It allows multihop also in Data link layer. The data link layer supports reliable packet transmission between node to node wireless connection. The sliding window protocol supports the reliable data communication in data link layer. In our architecture all reliable datas are going to upper layer which ensures there is no missing of data. 5 Conclusion In our proposed architecture we mentioned how data can be sent with in- tegrity and reliablity as we want reliable communication in multihop routing. As data is very important and valuable, if we lose data then it has a great impact on a persons condition and also has some environmental influences. • So our proposed architecture refers Safety Critical Ad - Hoc routing Architecture. 4