Flow Control Protocols

Slides:



Advertisements
Similar presentations
COMPUTER NETWORKS COMPUTER NETWORKS AIM To understand the basic concepts of data communication, networking and the usage of protocols. OBJECTIVES To study.
Advertisements

Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.
Midterm Review 1 Introduction –Basic terminology and concepts. Physical Layer –Time and frequency domains. –Bandwidth and data rate. –Analog and digital.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
Network Admin Course Plan Accede Institute Of Science & Technology.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Component 9 – Networking and Health Information Exchange Unit 1-2 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Information technology Data creation Data maintenance Data transfer.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
Networking and Health Information Exchange Unit 1b ISO Open Systems Interconnection (OSI) Component 9/Unit 1b1 Health IT Workforce Curriculum Version 1.0/Fall.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer.
The OSI Model An overview of the media layer (Physical, Data Link, Network) By Luke Shiffner.
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS COMPUTER NETWORKS AIM To understand the basic concepts of data communication, networking and the usage of protocols. OBJECTIVES To study.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Jaringan Komputer_D3 TT
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Part III. Data Link Layer
SE-307: Computer Communication Networks
Computer Communication & Networks
Sliding Window Protocol | Go-Back-N
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Computer networks.
Overview of Data Communications and Networking
Chapter 12 Multiple Access
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Underlying Technology
Bridging.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Introduction to Computer Networks
Ct1403 Lecture#2: DATA LINK LAYER
Introduction to Networking Prof. Ananjan Maiti. Overview of the course OSI and TCP/IP Models:  Open Systems Interconnection (OSI)  Transmission Control.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Data Transmission and Computer Communications ECE: 412
Chapter 5 The Network Layer.
Hubs Hubs are essentially physical-layer repeaters:
Data Link Layer: Data Link Control
Rivier College CS575: Advanced LANs Chapter 6: Logical Link Control
THE IEEE MAC SUB-LAYER – chapter 14
Overview Jaringan Komputer (2)
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Review First mile problem Internet End Users Last mile
Overview of Data Communications and Networking
Slides for Chapter 3: Networking and Internetworking
Overview of Data Communications and Networking
Computer Network Overview
Network Architecture for Cyberspace
Chapter 1. Introduction Data Communications
Technologies and Applications of Computer Networks
Technologies and Applications of Computer Networks
Introduction to TCP/IP protocol Suite
Computer Interfacing and Protocols
Anjuman College of Engineering and Technology Department of Computer Science and Engineering VII Sem. TCP and IP (Elective I) Prof. Nazish Khan.
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Flow Control Protocols Prepared By Prof. Anwarul Siddique Anjuman College Of Engg. & Tech. Department Of Computer Science & Engg.

Syllabus (Computer Network – 6th Sem CSE Introduction to computer Networks, direction of data flow (simplex,Half duplex, full duplex); Networks: distributed processing, network criteria, physical structure (type of connection, topology), categories of network (LAN, MAN, WAN); Internet: brief history, internet today; Protocols and standards; Reference models: OSI reference model, TCP/IP reference model, their comparative study Physical Layer: Types of errors, framing (character and bit stuffing), error detection & correction methods; Flow control; Protocols: Stop & wait ARQ, Go-Back- N ARQ, Selective repeat ARQ, HDLC; Point to point protocol, LCP, NCP, FDDI, token bus, token ring; Reservation, polling, concentration; Multiple access protocols: Pure ALOHA, Slotted ALOHA, CSMA, CSMA/CD, FDMA, TDMA, CDMA; ; Traditional Ethernet, fastEthernet; Routing : techniques, static vs. dynamic routing , routing table for classful address;Routing algorithms: shortest path algorithm, flooding, distance vector routing, link state routing, Mobile routing basic algorithms. Protocols: ARP,RARP, IP, ICMP, IPV6; Unicast and multicast routing protocols. Congestion control algorithm: Leaky bucket algorithm, Token bucket algorithm, choke packets. Congestion control protocols Process to process delivery; UDP; TCP; Quality of service: techniques to improve Qos.ISDN services &ATM; DSL technology, Cable modem, Sonet.Wireless LAN: IEEE 802.11; Introduction to blue-tooth, VLAN’s, Cellular telephony & Satellite network.

Course Outcome After completion of this course students will be able to explain different types of network topologies and protocols. enumerate and explain the functions of each layers of OSI and TCP/IP Model identify the types of Error and Error recovery mechanism. listing and explaining various Data Link layer Protocols like point to point protocol and multiple access protocols. analyze the concepts of Sub netting, Routing and listing, explain various routing algorithms. compare and assess various Congestion control protocols and other network layer protocols. To Assess the various parameters of Quality of Services and explain the concepts of ISDN, ATM reference model, SONET and Bluetooth Technology.

Contents:- Stop and Wait Protocol Stop and Wait ARQ

STOP AND WAIT PROTOCOL Simplest Protocol to achieve flow control. Very easy to implement and configure. Based on assumption that channel is error free.

STOP AND WAIT PROTOCOL It states that the sender transmits one frame and then stops, and wait, for the receiver to receive the frame and send back an acknowledgement. This simple delay before transmitting the next frame is an example of flow control. Unless the receiver sends back an acknowledgement, the sender is not allowed to transmit the next frame by the protocol.

STOP AND WAIT PROTOCOL Drawback:- Very low efficiency of only 17.5 %. It causes deadlock in case of lost frame and lost acknowledgement.

STOP AND WAIT PROTOCOL Lost Frame:- Sender transmits a frame, but due to transmission error or error in the channel the frame gets damaged or destroyed and is not received by the receiver. This frame is called Lost Frame. It Causes Deadlock because receiver is waiting for frame and the sender is waiting for acknowledgement.

STOP AND WAIT PROTOCOL Lost Acknowledgement :- In this case the frame is received properly by the receiver and the receiver send’s back an acknowledgment but due to channel or transmission errors the acknowledgment gets damaged or destroyed. Again this will result into deadlock.

STOP AND WAIT PROTOCOL ARQ The problems of Lost Frame and Lost Acknowledgement was solved in Stop and wait ARQ. The solution was pretty simple, to add a timer at the sender side. If the sender does not receive the acknowledgement before the timer goes off, the sender will automatically re-transmit the frame.

THANK YOU