Help | Spread | Share

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.

To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

Computer Networking : A Top-Down Approach

Computer Networking : A Top-down Approach

Authors: James F. Kurose, Keith W. Ross
ISBN: 9780132856201
Edition: 6
Chapter: Transport Layer
Exercise: Problems
Question: 9



Give a trace of the operation of protocol rdt3.0 when data packets and acknowledgment packets are garbled. Your trace should be similar to that used in Figure 3.16.


The following figures illustrates the tracing of the rdt3.0 protocol when data packets or the acknowledge (ACK) packets are corrupted.


The sender’s state is “wait for call from above” and the receiver’s state is “wait for 0 from below”.


Figure illustrating data sent by the sender is corrupted:

Figure illustrating ACK sent by the receiver is corrupted:

0 0


Post the discussion improve the above solution.