Question

In: Computer Science

A sender wants to transmit 16 frames in data link layer to a receiver, and every...

A sender wants to transmit 16 frames in data link layer to a receiver, and every 4th transmission is lost. How many total transmissions are required if

A) Go-back-3 flow control is used?

B) Selective repeat is used?

C) Stop-and-wait is used?

Solutions

Expert Solution

Solution:

Given,

=>Number of frames to be transmitted = 16 frames

=>Every 4th transmission is lost

(a)

Given,

=>Go-back-3 flow control is used.

Explanation:

=>Let say frame numbers are 1 to 16.

=>Window size of GBN = 3 means atmax 3 frames can be sent from the sender side.

=>In case of GBN if a frame is lost inside the window then whole window is retransmitted.

Calculating total number of frames transmitted:

1 2 3 4 2 3 4 5 6 7 8 6 7 8 9 10 11 12 10 11 12 13 14 15 16 14 15 16

=>Hence total number of frames transmitted = 28

(b)

=>Selective repeat is used.

Explanation:

=>In selective repeat only lost frame is retransmitted.

Calculating total number of frames transmitted:

1 2 3 4 4 5 6 7 7 8 9 10 10 11 12 13 13 14 15 16 16

=>Total number of frames transmitted = 21

(c)

Given,

=>Stop and wait protocol is used.

Explanation:

=>In stop and wait protocol only lost frame is retransmitted.

Calculating total number of frames transmitted:

1 2 3 4 4 5 6 7 7 8 9 10 10 11 12 13 13 14 15 16 16

=>Total number of frames transmitted = 21

I have explained each and every part with the help of statements attached to it.


Related Solutions

When encrypting data, we must ensure that both the sender and the receiver are in possession...
When encrypting data, we must ensure that both the sender and the receiver are in possession of the correct keys to allow them to either encrypt or decrypt the messages successfully. There are two main types of encryption defined by the number of different keys used. (10 marks total) i. Name each type and briefly explain how they are different? ii. Name one popular algorithm used for each type of encryption. iii. A user would like to send a long,...
Objective To explore the details of Ethernet frames. Ethernet is a popular link layer protocol that...
Objective To explore the details of Ethernet frames. Ethernet is a popular link layer protocol that is covered in §4.3 of your text; modern computers connect to Ethernet switches (§4.3.4) rather than use classic Ethernet (§4.3.2). Review section §4.3 before doing this exercise. Requirements Wireshark: This lab uses the Wireshark software application to capture and examine a packet trace. A packet trace is a record of traffic at a location on the network, as if a snapshot was taken of...
A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit...
A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit stuffing, what is actually transmitted after the bit stuffing? 2) We are transmitting 16-bit data using a Hamming code. What is the minimum number of check bits is needed to ensure that the receiver can correct a single-bit error?
a) TCP/IP what is the name of the packets at the data link layer? b) What...
a) TCP/IP what is the name of the packets at the data link layer? b) What are the two identifiers to locate a process in other part of the world so we can connect to it? c) Supposed you are making a broadcast in your local network and the broadcasts reach a router . Would the router forward this broadcast message further or stop it? Why or why not? d) Tcp/IP is the defacto network architecture for today's internet/ What...
A company wants to transmit data over the telephone but is concerned that its phones could be tapped
A company wants to transmit data over the telephone but is concerned that its phones could be tapped. All of the data are transmitted as four-digit integers. The company has asked you to write a program that encrypts the data so that it can be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then, swap the first digit with the...
The Data Link layer of OSI model has four functions associated with providing service to LAN...
The Data Link layer of OSI model has four functions associated with providing service to LAN users. These functions are split into two groups treated by logical link control (LLC) layer and medium access control (MAC) of IEEE 802 reference model. Why? What function(s) is handled by LLC and what others are handled by MAC?
Briefly list and describe several functions of the Data Link layer of any given communications protocol.
Briefly list and describe several functions of the Data Link layer of any given communications protocol.
A company wants to transmit data over the telephone, but is concerned that its phones could be tapped. All of the data are transmitted as four-digit integers.
  A company wants to transmit data over the telephone, but is concerned that its phones could be tapped. All of the data are transmitted as four-digit integers. The company has asked you to write a program that encrypts and decrypts the data so that it can be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then, swap the first...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT