Page 178 - Computer_Science_F5
P. 178
traffic, bandwidth limitations, network
bottlenecks, and numerous simultaneous In this method, the receiving machine sends
connections. an acknowledgment message back to the
sender upon successful receipt of data. The Chapter Three: Advanced Computer Networks
Techniques sender keeps track of each segment it sends
FOR ONLINE READING ONLY
1. Traffic shaping: Regulates data and waits for this acknowledgment before
transmission rates using algorithms proceeding with the transmission of the
like token and leaky bucket. next segment. To ensure timely delivery,
2. Congestion control algorithms: the transmitting machine starts a timer
Adjusts transmission rates based when a segment is sent. If the timer expires
on network conditions using TCP before receiving an acknowledgment
Tahoe, Reno, and New Reno. from the receiving machine, the
3. Random early detection (RED): sender will retransmit the segment. By
Proactively drops packets when implementing positive acknowledgment
traffic exceeds thresholds to with retransmission, reliable data delivery
prevent congestion. is achieved, ensuring the preservation of
4. Explicit congestion notification data integrity and minimising the chances
(ECN): Marks packets instead of duplication or loss.
of dropping them to indicate
congestion, prompting senders to
reduce rates.
5. Window-based flow control: Uses
sliding window mechanisms to
regulate outstanding packets, 1 2 3 4 5 6 1 2 3 4 5 6
adjusting window size based on Send 1
conditions.
Send 2
Acknowledgments Send 3
ACK 4
Reliable data delivery guarantees
the integrity of a data stream during Send 4
transmission between machines, Send 5 Connection lost!
preventing duplication or loss. This is Send 6 ACK 7
achieved by employing a fully functional
data link and utilising a technique Send 5 ACK 7
known as positive acknowledgment
with retransmission. Figure 3.24: Transport layer reliable delivery
169
Student’s Book Form Five
Computer Science Form 5.indd 169 23/07/2024 12:33