Solved

Question for network programmers

Posted on 2004-10-05
3
177 Views
Last Modified: 2010-04-17
First off I'm not a programmer. I'm a network tech. So forgive me if any of the terms I use seem strange.  I'm trying to understand how sliding window protocol operates in relation to the buffers.

Ok, let's say Computer A's TCP send buffer can allocate 8000 bytes. Computer B's receive buffer (window size) is only 6000 bytes.  Computer A's Application layer hands down a PDU of 8000 bytes to Computer A's  TCP.   Computer A's TCP places all 8000 bytes on it's send buffer.

Computer A will "window"  6000 bytes out of it's 8000 bytes it has on it's send buffer due to the window size Computer B advertised. It will then send the "window" of  6000 bytes of data to Computer B in several packets (each full size around 1460 bytes).

 As  Computer B receives the packets on it's receive buffer, it processes them quickly up the application layer and acknowledges Computer A.  This causes Computer B to free up it's receive buffer a bit more so it sends a window update to Computer A saying "win 2000".  Computer A then sends the remaining 2000 bytes.

Is that correct?
Thanks in advance
0
Comment
Question by:dissolved
  • 2
3 Comments
 
LVL 8

Expert Comment

by:gregasm
ID: 12233908
It depends on how Computer B is programmed to read the incoming stream.

If Computer B is programmed well, then it should behave as you envision.

Computer A should send packets to Computer B at either the fastest rate A can send it that B can receive it up to the limit of A, or else A will wait before sending more bytes if B is  backed beyond it's processing capabilities.

0
 

Author Comment

by:dissolved
ID: 12234037

Thanks gregasm.  Much appreciated. You network programmer guys are a sharp bunch no doubt. Hope to join you oneday. Long way to go for me though lol
0
 
LVL 8

Accepted Solution

by:
gregasm earned 500 total points
ID: 12234117
Thanks for your kind words, and good luck! As long as they think it is fun, anyone can do it!
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Since upgrading to Office 2013 or higher installing the Smart Indenter addin will fail. This article will explain how to install it so it will work regardless of the Office version installed.
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now