Page 178 - Computer_Science_F5
P. 178

traffic, bandwidth limitations, network
              bottlenecks, and numerous simultaneous   In this method, the receiving machine sends
              connections.                            an acknowledgment message back to the
                                                      sender upon successful receipt of data. The  Chapter Three: Advanced Computer Networks
              Techniques                              sender keeps track of each segment it sends
          FOR ONLINE READING ONLY
               1.  Traffic shaping: Regulates data    and waits for this acknowledgment before
                   transmission rates using algorithms   proceeding with the transmission of the
                   like token and leaky bucket.       next segment. To ensure timely delivery,
               2.  Congestion control algorithms:     the transmitting machine starts a timer
                   Adjusts transmission rates based   when a segment is sent. If the timer expires
                   on network conditions using TCP    before receiving an acknowledgment
                   Tahoe, Reno, and New Reno.         from the receiving machine, the

               3.  Random early detection (RED):      sender will retransmit the segment. By
                   Proactively drops packets when     implementing positive acknowledgment
                   traffic exceeds thresholds to      with retransmission, reliable data delivery
                   prevent congestion.                is achieved, ensuring the preservation of
               4.  Explicit congestion notification   data integrity and minimising the chances
                   (ECN): Marks packets instead       of duplication or loss.
                   of dropping them to indicate
                   congestion, prompting senders to
                   reduce rates.

               5.  Window-based flow control: Uses
                   sliding window mechanisms to
                   regulate outstanding  packets,       1  2 3  4 5   6      1  2 3   4 5   6
                   adjusting window size based on           Send 1
                   conditions.
                                                            Send 2
              Acknowledgments                               Send 3
                                                                                   ACK 4
              Reliable data delivery guarantees
              the integrity of a data stream during         Send 4
              transmission between machines,                Send 5          Connection lost!
              preventing duplication or loss. This is       Send 6                 ACK 7
              achieved by employing a fully functional
              data link and utilising a technique           Send 5                 ACK 7

              known as positive acknowledgment
              with retransmission.                      Figure 3.24: Transport layer reliable delivery

                                                    169
               Student’s Book  Form Five



     Computer Science Form 5.indd   169                                                     23/07/2024   12:33
   173   174   175   176   177   178   179   180   181   182   183