1 / 19

Sliding window protocol

Sliding window protocol. The sender continues the send action without receiving the acknowledgements of at most w messages ( w > 0), w is called the window size. {program for process S} define next, last, w : integer ; initially next = 0, last = -1, w > 0

krico
Download Presentation

Sliding window protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sliding window protocol • The sender continues the send action • without receiving the acknowledgements of at most • w messages (w > 0), w is called the window size.

  2. {program for process S} define next, last, w : integer; initially next = 0, last = -1, w > 0 do last+1 ≤ next ≤ last + w  send (m[next], next); next := next + 1 (ack, j) is received  if j > last last := j  j ≤ last  skip fi timeout (R,S)  next := last+1 {retransmission begins} od {program for process R} define j : integer; initially j = 0; do (m[next], next) is received  if j = next  accept message; send (ack, j); j:= j+1  j ≠ next  send (ack, j-1) fi; od Sliding window protocol

  3. Why does it work? Lemma. Every message is accepted exactly once. Lemma. m[k] is always accepted before m[k+1]. (Argue that these are true.) Observation. Uses unbounded sequence number. This is bad. Can we avoid it?

  4. Theorem If the communication channels are non-FIFO, and the message propagation delays are arbitrarily large, then using bounded sequence numbers, it is impossible to design a window protocol that can withstand the (1) loss, (2) duplication, and (3) reordering of messages.

  5. Why unbounded sequence no? (m’’,k) (m’, k) (m[k],k) New message using the same seq number k Retransmitted version of m We want to accept m” but reject m’. How is that possible?

  6. Alternating Bit Protocol m[2],0 m[1],1 m[0],0 m[0],0 R S ack, 0 ABP is a link layer protocol. Works on FIFO channels only. Guarantees reliable message delivery with a 1-bit sequence number (this is thetraditional version with window size = 1). Study how this works.

  7. Alternating Bit Protocol programABP; {program for process S} define sent, b : 0 or 1; next : integer; initially next = 0, sent = 1, b = 0, and channels are empty; do sent ≠b  send (m[next], b); next := next+1; sent := b  (ack, j) is received if j = b  b := 1-b  j ≠ b  skip fi timeout (R,S)  send (m[next-1], b) od {program for process R} define j : 0 or 1; {initially j = 0}; do (m[ ], b) is received  if j = b  accept the message; send (ack, j); j:= 1 - j  j ≠ b  send (ack, 1-j) fi od S m[2],0 m[1],1 a,0 m[0],0 m[0],0 R

  8. How TCP works Supports end-to-end logical connectionbetween any two computers on the Internet. Basic idea is the same as those of sliding window protocols. But TCP uses bounded sequence numbers! It is safe to re-use a sequence number when it is unique. With a high probability, a random 32 or 64-bit number is unique. Also, current sequence numbers are flushed out of the system after a time = 2d, where d is the round trip delay.

  9. How TCP works

  10. How TCP works • Three-way handshake. Sequence numbers are unique w.h.p. • Why is the knowledge of roundtrip delay important? • What if the window is too small / too large? • What if the timeout period is too small / too large? • Adaptive retransmission: receiver can throttle sender • and control the window size to save its buffer space.

  11. Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement about which process has failed Clock phase synchronization Air traffic control system: all aircrafts must have the same view If there is no failure, then reaching consensus is trivial. All-to-all broadcast Followed by a applying a choice function … Consensus in presence of failures can however be complex.

  12. Problem Specification output input v u0 p0 v u1 p1 u2 p2 v p3 u3 v Here, v must be equal to the value at some input line. Also, all outputs must be identical.

  13. Problem Specification Termination. Every non-faulty process must eventually decide. Agreement. The final decision of every non-faulty process must be identical. Validity. If every non-faulty process begins with the same initial value v, then their final decision must be v.

  14. Asynchronous Consensus Seven members of a busy household decided to hire a cook, since they do not have time to prepare their own food. Each member separately interviewed every applicant for the cook’s position. Depending on how it went, each member voted "yes" (means “hire”) or "no" (means “don't hire”). These members will now have to communicate with one another to reach a uniform final decision about whether the applicant will be hired. The process will be repeated with the next applicant, until someone is hired. Consider various modes of communication…

  15. Asynchronous Consensus Theorem. In a purely asynchronous distributed system, the consensus problem is impossible to solve if even a single process crashes Famous result due to Fischer, Lynch, Patterson (commonly known as FLP 85)

  16. Proof Bivalent and Univalent states A decision state is bivalent, if starting from that state, there exist two distinct executions leading to two distinct decision values 0 or 1. Otherwise it isunivalent. A univalent state may beeither 0-valent or 1-valent.

  17. Proof Lemma. No execution can lead from a 0-valent to a 1-valent state or vice versa. Proof. Follows from the definition of 0-valent and 1-valent states.

  18. Proof Lemma. Every consensus protocol must have a bivalent initial state. Proof by contradiction.Suppose not. Then consider the following input patterns: s[0]0 0 0 0 0 0 …0 0 0 {0-valent) 0 0 0 0 0 0 …0 0 1 s[j] is 0-valent 0 0 0 0 0 0 …0 1 1 s[j+1] is 1-valent … … … … (differ in jth position) s[n-1] 1 1 1 1 1 1 …1 1 1 {1-valent} What if process (j+1) crashes at the first step?

  19. Lemma. In a consensus protocol, starting from any initial bivalent state, there must exist a reachable bivalent stateT, such that every action taken by some process p in state T leads to either a 0-valent or a 1-valent state. Proof The adversary tries to prevent The system from reaching consensus Actions 0 and 1 from T must be taken by the same process p. Why?

More Related