. Chained variable-sized buffers ii. One large circular buffer per connection

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter12: Secondary Storage Management
Section: Chapter Questions
Problem 3VE
icon
Related questions
Question

Subject: Computer Networks

Note: Answer this according to "Attached Picture's Diagram and contents"

Question: Describe the following buffering mechanism in a reliable transport protocol

i. Chained variable-sized buffers

ii. One large circular buffer per connection

Flow Control and Buffering
If most TPDU are nearly the same size, it is natural to organize
the buffers as a pool of identically-sized buffers, with one
TPDU per buffer
If there is a wide variation in TPDU size, a pool of fixed-sized
buffer presents problem
If the buffer size is chosen equal to the largest possible TPDU,
space will be wasted whenever a short TPDU arrives
If the buffer size is chosen, less than the maximum TPDU size,
multiple buffers will be needed fro long TPDU, creates
more complexity
Flow Control and Buffering
TPDU 1
TPDU 2
TPDU 3
(a)
(b)
TPDU 4
Unused
space
(c)
(a) Chained fixed-size buffers. (b) Chained variable-sized buffers.
(c) One large circular buffer per connection.
Transcribed Image Text:Flow Control and Buffering If most TPDU are nearly the same size, it is natural to organize the buffers as a pool of identically-sized buffers, with one TPDU per buffer If there is a wide variation in TPDU size, a pool of fixed-sized buffer presents problem If the buffer size is chosen equal to the largest possible TPDU, space will be wasted whenever a short TPDU arrives If the buffer size is chosen, less than the maximum TPDU size, multiple buffers will be needed fro long TPDU, creates more complexity Flow Control and Buffering TPDU 1 TPDU 2 TPDU 3 (a) (b) TPDU 4 Unused space (c) (a) Chained fixed-size buffers. (b) Chained variable-sized buffers. (c) One large circular buffer per connection.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 2 images

Blurred answer
Knowledge Booster
Risk Management
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning