SlideShare a Scribd company logo
SlidingSliding WindoWWindoW
ProtocolProtocol
(1 bit protocol)(1 bit protocol)
By : W.M.L.S.Abeythunga
A.A.D.S Nirmani
2010/ICT/12
2010/ICT/23
Content
‱ ‱ Communication
‱ ‱ Sliding Window Protocol
‱ ‱ Key concepts
‱ ‱ Piggybacking
‱ ‱ Sender Side
‱ ‱ Receiver Side
‱ ‱ One bit Sliding Window
‱ ‱ Merits & demerits
Communication 


Sliding Window Protocol
‱ Sliding window algorithms are a method of flow
control for network data transfers.
‱ Data Link Layer uses a sliding window algorithm,
which allows a sender to have more than one
unacknowledged packet "in flight" at a time,
which improves network throughput.
Key concepts of the Sliding
Window
‱ Both the sender and receiver maintain a finite size buffer to hold
outgoing and incoming packets from the other side.
‱ Every packet sent by the sender, must be acknowledged by the
receiver. The sender maintains a timer for every packet sent, and
any packet unacknowledged in a certain time, is resent.
‱ The sender may send a whole window of packets before
receiving an acknowledgement for the first packet in the window.
This results in higher transfer rates, as the sender may send
multiple packets without waiting for each packet's
acknowledgement.
‱ The Receiver advertises a window size that tells the sender how
much data it can receive, in order for the sender not to fill up the
receivers buffers.
‱ Efficiency can also be improved by making use of the full-duplex
line
A B
Sliding Window
Piggybacking
‱ when a data frame arrives, instead of immediately
sending a separate control frame, the receiver restrains
itself and waits until the network layer passes it to the next
packet.
‱ The acknowledgement is attached to the outgoing data
frame (using the ack field in the frame header).
‱ The acknowledgement gets a free ride on the next
outgoing data frame.
‱ The technique of temporarily delaying outgoing
acknowledgements so they can be hooked onto the next
out going data frame is piggybacking
Sender Side
‱ To keep track of the frames, sender station sends sequentially
numbered frames.
‱ Since the sequence number to be used occupies a field in the
frame, it should be limited size.
‱ If the header of the frame allows k bits, the sequence numbers
range from 0 to 2k
– 1.
‱ Sender maintains a list of sequence numbers that it is allowed to
send(sender window).
‱ The size of the senders window is at most 2k
– 1.
– Eg:- if frame allows 3 bits, then the size of the window is
23
-1=7
‱ The sender is provided with a buffer equal to the window size.
0 1 2 3 4 5 6
Receiver Side
‱ Receiver always maintains window size as 1.
‱ The receiver acknowledges a frame by sending an ACK frame
that includes the sequence number of the next frame expected.
‱ This also explicitly announces that it is prepared to receive the
next N frames, beginning with the number specified.
‱ This scheme can be used to acknowledge multiple frames.
‱ It could receive frames 2,3,4 but withhold ACK until frame 4 has
arrived. By returning an ACK with sequence number 5, it
acknowledges frames 2, 3, 4 at one time.
‱ The receiver needs a buffer of size 1.
One bit Sliding Window
‱ Here K=1 at the senders side.
‱ Then the size of the senders window is,
2k
– 1
K=1
21
-1=2-1=1
‱ This is same as the stop and wait protocol.
-A sliding window of size 1, with a 3-bit sequence number-
(a) Initially.
(b) After the first frame has been sent.
(c) After the first frame has been received.
(d) After the first acknowledgement has been received.
One bit Sliding Window protocol
‱ The notation is (seq, ack, packet number).
Part (a): If B waits for A’s first frame before sending one of its own. Each frame
arrival brings a new packet for the network layer; there are no duplicates.
Part (b): If A and B simultaneously initiate communication, their first frames
cross, and the data link layers gets into a situation. Half of the frames contain
duplicates, even though there are no transmission errors
Merits
‱ Multiple packets can be transmit without waiting for
acknowledgements.(not like stop & wait)
‱ Piggibacking (using full-duplex lines)
Demerits
‱ No limit of the size or sequence numbers that can be
required in this protocol.
‱ The bandwidth may be wasted in some special situations.
Reference
‱ Sliding window animation reference:
www.youtube.com/watch?v=zY3Sxvj8kZA
ThankThank
You !You !
Ad

More Related Content

What's hot (20)

Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
Simplilearn
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
shilpa patel
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE SmĂąrt
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
Lal Bahadur Gehlot
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
Simplilearn
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
shilpa patel
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE SmĂąrt
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
Lal Bahadur Gehlot
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 

Similar to Sliding window protocol (20)

CN_unit2.ppt Data Link Layer characteristics, categories
CN_unit2.ppt Data Link Layer characteristics, categoriesCN_unit2.ppt Data Link Layer characteristics, categories
CN_unit2.ppt Data Link Layer characteristics, categories
VSrilakshmi2
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
Nt Arvind
 
PCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESPCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTES
sirishayerraboina
 
sliding-window-protocol-ppt-free-download.pdf.pptx
sliding-window-protocol-ppt-free-download.pdf.pptxsliding-window-protocol-ppt-free-download.pdf.pptx
sliding-window-protocol-ppt-free-download.pdf.pptx
skshruthi
 
Go back.pptx
Go back.pptxGo back.pptx
Go back.pptx
Mithunkumar91359
 
Flow Control.pptx
Flow Control.pptxFlow Control.pptx
Flow Control.pptx
AshokRachapalli1
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
ShanthalaKV
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
sabitha sairam
 
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
gagansaigudi
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
TejasRao8
 
Computernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptxComputernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptx
DivyaShree999621
 
Data link layer (Unit 2).pdf
Data link layer (Unit 2).pdfData link layer (Unit 2).pdf
Data link layer (Unit 2).pdf
BharatiPatelPhDStude
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control
gondwe Ben
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
pdegree76
 
Flow control main
Flow control mainFlow control main
Flow control main
Nitesh Singh
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)
Hira Awan
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
TechiNerd
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
CN_unit2.ppt Data Link Layer characteristics, categories
CN_unit2.ppt Data Link Layer characteristics, categoriesCN_unit2.ppt Data Link Layer characteristics, categories
CN_unit2.ppt Data Link Layer characteristics, categories
VSrilakshmi2
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
Nt Arvind
 
PCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESPCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTES
sirishayerraboina
 
sliding-window-protocol-ppt-free-download.pdf.pptx
sliding-window-protocol-ppt-free-download.pdf.pptxsliding-window-protocol-ppt-free-download.pdf.pptx
sliding-window-protocol-ppt-free-download.pdf.pptx
skshruthi
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
ShanthalaKV
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
sabitha sairam
 
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf1.5.pdf
gagansaigudi
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
TejasRao8
 
Computernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptxComputernetdfghuugfdssssddddfworkar.pptx
Computernetdfghuugfdssssddddfworkar.pptx
DivyaShree999621
 
Data link layer (Unit 2).pdf
Data link layer (Unit 2).pdfData link layer (Unit 2).pdf
Data link layer (Unit 2).pdf
BharatiPatelPhDStude
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control
gondwe Ben
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
pdegree76
 
Flow control main
Flow control mainFlow control main
Flow control main
Nitesh Singh
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)
Hira Awan
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
TechiNerd
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
Ad

Recently uploaded (20)

Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Datastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptxDatastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptx
kaleeswaric3
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Image processinglab image processing image processing
Image processinglab image processing  image processingImage processinglab image processing  image processing
Image processinglab image processing image processing
RaghadHany
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Leading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael JidaelLeading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael Jidael
Michael Jidael
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
Lynda Kane
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Datastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptxDatastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptx
kaleeswaric3
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Image processinglab image processing image processing
Image processinglab image processing  image processingImage processinglab image processing  image processing
Image processinglab image processing image processing
RaghadHany
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Leading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael JidaelLeading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael Jidael
Michael Jidael
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
Lynda Kane
 
Ad

Sliding window protocol

  • 1. SlidingSliding WindoWWindoW ProtocolProtocol (1 bit protocol)(1 bit protocol) By : W.M.L.S.Abeythunga A.A.D.S Nirmani 2010/ICT/12 2010/ICT/23
  • 2. Content ‱ ‱ Communication ‱ ‱ Sliding Window Protocol ‱ ‱ Key concepts ‱ ‱ Piggybacking ‱ ‱ Sender Side ‱ ‱ Receiver Side ‱ ‱ One bit Sliding Window ‱ ‱ Merits & demerits
  • 4. Sliding Window Protocol ‱ Sliding window algorithms are a method of flow control for network data transfers. ‱ Data Link Layer uses a sliding window algorithm, which allows a sender to have more than one unacknowledged packet "in flight" at a time, which improves network throughput.
  • 5. Key concepts of the Sliding Window ‱ Both the sender and receiver maintain a finite size buffer to hold outgoing and incoming packets from the other side. ‱ Every packet sent by the sender, must be acknowledged by the receiver. The sender maintains a timer for every packet sent, and any packet unacknowledged in a certain time, is resent. ‱ The sender may send a whole window of packets before receiving an acknowledgement for the first packet in the window. This results in higher transfer rates, as the sender may send multiple packets without waiting for each packet's acknowledgement. ‱ The Receiver advertises a window size that tells the sender how much data it can receive, in order for the sender not to fill up the receivers buffers. ‱ Efficiency can also be improved by making use of the full-duplex line A B
  • 7. Piggybacking ‱ when a data frame arrives, instead of immediately sending a separate control frame, the receiver restrains itself and waits until the network layer passes it to the next packet. ‱ The acknowledgement is attached to the outgoing data frame (using the ack field in the frame header). ‱ The acknowledgement gets a free ride on the next outgoing data frame. ‱ The technique of temporarily delaying outgoing acknowledgements so they can be hooked onto the next out going data frame is piggybacking
  • 8. Sender Side ‱ To keep track of the frames, sender station sends sequentially numbered frames. ‱ Since the sequence number to be used occupies a field in the frame, it should be limited size. ‱ If the header of the frame allows k bits, the sequence numbers range from 0 to 2k – 1. ‱ Sender maintains a list of sequence numbers that it is allowed to send(sender window). ‱ The size of the senders window is at most 2k – 1. – Eg:- if frame allows 3 bits, then the size of the window is 23 -1=7 ‱ The sender is provided with a buffer equal to the window size. 0 1 2 3 4 5 6
  • 9. Receiver Side ‱ Receiver always maintains window size as 1. ‱ The receiver acknowledges a frame by sending an ACK frame that includes the sequence number of the next frame expected. ‱ This also explicitly announces that it is prepared to receive the next N frames, beginning with the number specified. ‱ This scheme can be used to acknowledge multiple frames. ‱ It could receive frames 2,3,4 but withhold ACK until frame 4 has arrived. By returning an ACK with sequence number 5, it acknowledges frames 2, 3, 4 at one time. ‱ The receiver needs a buffer of size 1.
  • 10. One bit Sliding Window ‱ Here K=1 at the senders side. ‱ Then the size of the senders window is, 2k – 1 K=1 21 -1=2-1=1 ‱ This is same as the stop and wait protocol.
  • 11. -A sliding window of size 1, with a 3-bit sequence number- (a) Initially. (b) After the first frame has been sent. (c) After the first frame has been received. (d) After the first acknowledgement has been received.
  • 12. One bit Sliding Window protocol ‱ The notation is (seq, ack, packet number). Part (a): If B waits for A’s first frame before sending one of its own. Each frame arrival brings a new packet for the network layer; there are no duplicates. Part (b): If A and B simultaneously initiate communication, their first frames cross, and the data link layers gets into a situation. Half of the frames contain duplicates, even though there are no transmission errors
  • 13. Merits ‱ Multiple packets can be transmit without waiting for acknowledgements.(not like stop & wait) ‱ Piggibacking (using full-duplex lines) Demerits ‱ No limit of the size or sequence numbers that can be required in this protocol. ‱ The bandwidth may be wasted in some special situations.
  • 14. Reference ‱ Sliding window animation reference: www.youtube.com/watch?v=zY3Sxvj8kZA