Explain the working of 3 bit sliding window protocol with suitable example.



Explain the working of 3 bit sliding window protocol with suitable example...

Answer / naresh

A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery of packets is required, such as in the Data Link Layer (OSI layer 2) as well as in the Transmission Control Protocol (TCP).

Ambiguity example

The transmitter alternately sends packets marked "odd" and "even". The acknowledgments likewise say "odd" and "even". Suppose that the transmitter, having sent an odd packet, did not wait for an odd acknowledgment, and instead immediately sent the following even packet. It might then receive an acknowledgment saying "expecting an odd packet next". This would leave the transmitter in a quandary: has the receiver received both of the packets, or neither?
Suppose that we are using a 3-bit sequence number, such as is typical for HDLC. This gives N=2³=8. Since wr=1, we must limit wt≤7. This is because, after transmitting 7 packets, there are 8 possible results: Anywhere from 0 to 7 packets could have been received successfully. This is 8 possibilities, and the transmitter needs enough information in the acknowledgment to distinguish them all.

If the transmitter sent 8 packets without waiting for acknowledgment, it could find itself in a quandary similar to the stop-and-wait case: does the acknowledgment mean that all 8 packets were received successfully, or none of them?
Ambiguity example
Edit
The extremely popular HDLC protocol uses a 3-bit sequence number, and has optional provision for selective repeat. However, if selective repeat is to be used, the requirement that nt+nr ≤ 8 must be maintained; if wr is increased to 2, wt must be decreased to 6.

Suppose that wr =2, but an unmodified transmitter is used with wt =7, as is typically used with the go-back-N variant of HDLC. Further suppose that the receiver begins with nr =ns =0.

Now suppose that the receiver sees the following series of packets (all modulo 8):

0 1 2 3 4 5 6 (pause) 0
Because wr =2, the receiver will accept and store the final packet 0 (thinking it is packet 8 in the series), while requesting a retransmission of packet 7. However, it is also possible that the transmitter failed to receive any acknowledgments and has retransmitted packet 0. In this latter case, the receiver would accept the wrong packet as packet 8. . The solution is for the transmitter to limit wt ≤6. With this restriction, the receiver knows, after receiving packet 6, that the transmitter's na ≥1, and thus the following packet numbered 0 must be packet 8. If all acknowledgements were lost, then the transmitter would have to stop after packet 5.

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQahH7l3Pq_FciLP2ig6WmKjZfQeaD-8e_A4D_Y-KzGbejhLh3uLQ

Is This Answer Correct ?    1 Yes 2 No

Post New Answer

More Networking AllOther Interview Questions

What EMC hardware have you worked on? (like DMX3/4 etc) --SAN

0 Answers  


what does FTP and TFTP stands for ?

6 Answers  


Hi , I need help form u. I need information about Cloud storage.As a test engineer how can i test the cloud storage. what i need to learn before going to test the cloud storage application. These are the some of the Questions related to Cloud Storage. 1. What is meant by Cloud Storage? 2. What cloud storage Requires? 3. What factors should you consider before implementing cloud storage? 4. How do Private storage clouds compare with large commercial cloud service offerings? 5. Where to use Public Cloud storage? 6. Where to use Private Cloud storage? 7. Where exactly the cloud storage will be used? 8. Cloud storage means Maintaining the data some ware in server or what? If they Maintain data where it will save? 9. In which Environment the cloud storage can be developed? 10. Is the Cloud storage support XP OS? 11. Up to what extent the tester should know about cloud storage to test the storage part? Mainly send me the details how testers are going to test the Cloud storage application. ASAP.....

1 Answers  


What is traffic shaping

0 Answers   Elgi Equipments,


How is Ntework Testing carried out?

1 Answers  






what is the function of msconfig in our system...?

2 Answers  


Explain Token ring

0 Answers  


What was the reason for selecting a speed of 155.52 Mbps in the original ATM standard ?

0 Answers  


What is Brouter? and what is the advantages and dis advantages of Brouters?

2 Answers  


x.25 protocol encapsulates the follwing layers a)network b)datalink c)physical d)all of the above e)none of the above

4 Answers   Infosys, Siemens,


What problems with the network you had had and how you solved it?

0 Answers   HCL,


What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)