csc 311 chapter eight flow control techniques. csc 311 chapter eight how do we manage the large...

32
CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES

Upload: godwin-griffith

Post on 03-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

FLOW CONTROL TECHNIQUES

Page 2: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

How do we manage the large amount of data on the network?

How do we react to a damaged transmission?

How do we ensure that messages are correctly delivered?

How can we transmit multiple frames efficiently?

How can we reconcile computers that operate at dramaticallydifferent speeds?

These are issues that relate to error control and flow control.

We have previously examined how to detect errors, how do wehandle the errors that we detect?

How do we prevent devices from being overwhelmed with data?

Page 3: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

We have learned how to detect errors, what action should we taketo correct errors?

One common technique is to request a retransmission of lost ordamaged frames.

There are a number of protocols that operate in this fashion,generally called “automatic repeat request” of ARQ.

ERROR CONTROL

Page 4: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

FLOW CONTROL

Flow control defines the way in which many frames are sentand tracked and how the stations do error control.

There are a number of different flow control protocols ranging

from simple to complex.

Simple techniques might involve sending a single frame at atime or no flow control at all, unrestricted..send all frameswhenever you wish.

More complicated protocols try to strike a balance betweenunrestricted and overly restricted.

Page 5: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Basic Flow Control …. Signaling

Sender sends data as long as receiver is able to receive it.

Sender will send until receiver says stop and will not start

again, until notified by receiver that it is OK to do so.

Page 6: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

X-ON/ X-OFF

Rather than use separate lines to signal, the signals can be embedded in the data.The figure shown below assumes full duplex communication whichmeans there is no distinction between a sender and a receiver.

In this instance, A is becoming overloaded with data from B, B is nothaving a similar problem with data from A. After receiving the X-OFF fromA, B will stop sending data to A but A can still send data to B. B will resumeonly after A sends and X-ON. Because of the time required for the X-OFFmessage to propagate through the system, A will continue to receive datafrom B for a short period of time.

Page 7: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

FRAME ORIENTED PROTOCOLS

Protocols such as X-ON/X-OFF are byte oriented, typical of asynchronouscommunication.

Frame oriented, synchronous communications require a more sophisticatedmanagement technique.

We will be looking at transmission of frames of whatever type and sizesupported by the underlying protocol architecture.

Page 8: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

FRAME ORIENTED FLOW CONTOL PROTOCOLS

• UNRESTRICTED

• STOP AND WAIT

• SLIDING WINDOW

• GO BACK N• SELECTIVE REPEAT

Page 9: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

UNRESTRICTED FLOW CONTROL PROTOCOL

Assumes receiver has unlimited capability to receive frames orthat unlimited buffering capacity is available.

It assumes that every frame will arrive without damage and

in the order sent.

No error checking is done and no checking is done for

lost or delayed frames.

Page 10: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

STOP AND WAIT PROTOCOL

Simple to implement.

Sender sends a single frame and waits for an acknowledgementbefore sending another.

Essentially, it sends a single frame and “stops and waits” for a response from the receiver before sending another.

It is simple, but slow. Not effective in high traffic environmentsand not practicable in many situations.

Though only a single frame is ever in transit, the frames are stillnumbered. Frames are numbered alternately, 0 or 1. This is necessary to avoid confusion and ensure correctness of the protocol.

After receiving a frame number 0, for example, the receiver willreturn an ACK1, which indicates to the sender that frame 0 was received correctly, without errors, and that the receiver now expects a frame numbered 1.

Page 11: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

What might go wrong? Note: the author is not entirely correct!!

Frame could be damaged.Frame could be lost.Positive acknowledgement could be lostNegative acknowledgement could be lost

Protocol must, (AND DOES!!!) handle this.Author does not point out that, upon sending a frame, thesender starts a timer. If this timer times out, sender will resendthe frame.

Page 12: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

When is STOP AND WAIT not suitable.

When traffic is heavy because, it does not make good utilization of network capacity

When propagation time is much larger than transmission time.

Transmission time is the time required to put the message onthe network.

Propagation time is time required to traverse the network.Stop and Wait would be terrible for satellite communication.

Propagation time is approx. 0.25 seconds each way. Total .5sConsider a network capable of sending 100Mbps and a framesize of 10000 bits. It would take 1 ten thousandth of a secondto put the frame on the network, it would take one-half secondfor the frame to arrive and the ACK to get back to sender.So, in this instance, in one second only 20,000 bits would be senton a network capable of sending 100,000,000 bits per second or a utilization of 0.02%

Page 13: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 14: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 15: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 16: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 17: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 18: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 19: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 20: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 21: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 22: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 23: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 24: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 25: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 26: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 27: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 28: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 29: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 30: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 31: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight

Page 32: CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged

CSC 311 Chapter Eight