Skip to main content

NETWORKING (LECTURE 6)

                                                           MARWARI COLLEGE,RANCHI
                                              (UNDER RANCHI UNIVERSITY RANCHI)
NAME : RAJU MANJHI,PRAKASH KUMAR
SUB: NETWORKING
SEM : IT IV
________________________________________________________________________________


Data Link layer:

Topic : Flow Control Protocols:

There are various flow control protocols which are classified as-




Stop and Wait Protocol-


Stop and Wait Protocol is the simplest flow control protocol.
It works under the following assumptions-
·         Communication channel is perfect.
·         No error occurs during transmission.
Working-

The working of a stop and wait protocol may be explained as-
·         Sender sends a data packet to the receiver.
·         Sender stops and waits for the acknowledgement for the sent packet from the receiver.
·         Receiver receives and processes the data packet.
·         Receiver sends an acknowledgement to the sender.
·         After receiving the acknowledgement, sender sends the next data packet to the receiver.
These steps are illustrated below-



Analysis of the protocol-



Now, let us analyze in depth how the transmission is actually carried out-

·         Sender puts the data packet on the transmission link.
·         Data packet propagates towards the receiver’s end.
·         Data packet reaches the receiver and waits in its buffer.
·         Receiver processes the data packet.
·         Receiver puts the acknowledgement on the transmission link.
·         Acknowledgement propagates towards the sender’s end.
·         Acknowledgement reaches the sender and waits in its buffer.
·         Sender processes the acknowledgement.



Total Time-


Total time taken in sending one data packet
= (Transmission delay + Propagation delay + Queuing delay + Processing delay)packet
+
(Transmission delay + Propagation delay + Queuing delay + Processing delay)ACK



Assume-
·         Queuing delay and processing delay to be zero at both sender and receiver side.
·         Transmission time for the acknowledgement to be zero since it’s size is very small.

Under the above assumptions.

Total time taken in sending one data packet
= (Transmission delay + Propagation delay)packet + (Propagation delay)ACK

We know,
·         Propagation delay depends on the distance and speed.
·         So, it would be same for both data packet and acknowledgement.

So, we have-

Total time taken in sending one data packet
= (Transmission delay)packet + 2 x Propagation delay

Efficiency-

Efficiency of any flow control control protocol is given by-

Efficiency (η) = Useful Time / Total Time

where-
·         Useful time = Transmission delay of data packet = (Transmission delay)packet
·         Useless time = Time for which sender is forced to wait and do nothing = 2 x Propagation delay
·         Total time = Useful time + Useless time


Advantages-

The advantages of stop and wait protocol are-
·         It is very simple to implement.
·         The incoming packet from receiver is always an acknowledgement.

Limitations-

The limitations of stop and wait protocol are-
  
a)It is extremely inefficient because-
·         It makes the transmission process extremely slow.
·         It does not use the bandwidth entirely as each single packet and acknowledgement uses the entire time to traverse the link. 

b)If the data packet sent by the sender gets lost, then-
·         Sender will keep waiting for the acknowledgement for infinite time.
·         Receiver will keep waiting for the data packet for infinite time.
c)
 If acknowledgement sent by the receiver gets lost, then-
·         Sender will keep waiting for the acknowledgement for infinite time.
·         Receiver will keep waiting for another data packet for infinite time.


Question : Describe Stop And Wait Protocol.
                :   Write short notes on Stop and wait protocol
                    : What is Stop and wait protocol. Describe the limitation of stop and wait protocol


Comments

Popular posts from this blog

EDP INTRODUCTION

                                                     MARWARI COLLEGE RANCHI                                                (UNDER RANCHI UNIVERSITY ,RANCHI) RAJU MANJHI  DEP. OF B.Sc(CA) ,MCR ________________________________________________________________________________ SEMESTER : VI BCA/IT/BCM  SUBJECT : EDP TOPIC : DEFINITION OF EDP : Entrepreneurship 1.        Concept:            Entrepreneurship is derived from French root, which means to undertake. But people today call it by various names - adventuresome (to start something different from others), risk taking, thrill seeking (much of up’s and down’s), innovating (something new). Hence the word entrepreneurship in today’s concept can be called an event of adventuresome which takes risks, seeks thrills and innovative. I.         According to Higgins: Entrepreneurship is the function of seeking investment and production opportunity, organizing an enterprise to undertake a new function process, raising ca

EDP (LECTURE 3)

MARWARI COLLEGE,RANCHI (UNDER RANCHI UNIVERSITY,RANCHI) NAME : RAJU MANJHI SUB: EDP SEM: VI(CA/IT/CM) ______________________________________________________________________________ Identification of business opportunities. An entrepreneur perceives an   opportunity for marketing a product or service, then he establishes a business unit on the basis of his or her perception, finally he manages his enterprise, expanding, growing or diversifying over a period of time. In order to establish an entrepreneurial system an entrepreneur needs to take following steps for identification of right opportunity. 1)        Search for business idea: The task of promotion begins with the search of suitable business idea and opportunity. The idea may generate from various sources and should be rated to the starting of a new business or taking over an existing business enterprise. The idea should be sound and workable, so that it may be exploited. It should yield suitable return

Lecture 5 (BCM)

Benefits of Using Proxy Servers 1. Your IP Address Is Hidden One of the best proxy server advantages – by using a proxy, the website you access will not be able to log your real IP address, as it will log the proxy server’s IP address instead. Yes, that means you’re somewhat anonymous when you browse online. D on’t forget –   your IP address   ca n tell someone a lot about yourself, like what country and city you are from. Crafty cyber criminals can even go the extra mile and use your IP address to find out things like who your ISP is, what your zip code is, and even what street you live on.   How would a hacker get access to your IP address, you ask? Sadly, a data breach or leak on a website you visit could be enough for them to get their hands on this info. So, something like this is definitely useful nowadays. 2. You Can Access Geo-Blocked or Restricted Content Unfortunately, a lot of online content is actually hidden behind  geo-restrictions  – mostly because of net