Тёмный

3.4-1 Principles of Reliable Data Transfer (Part 1) 

JimKurose
Подписаться 21 тыс.
Просмотров 126 тыс.
50% 1

Опубликовано:

 

30 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 58   
@abcde9421
@abcde9421 2 года назад
17:21 Worth listening to for a 100 times.
@jaronajohnson4412
@jaronajohnson4412 2 года назад
always makes me laugh :D
@eDog377
@eDog377 9 месяцев назад
worth the wait
@VikasSharma05
@VikasSharma05 8 месяцев назад
Really worth the wait. Don't know why, jar jar binks just flashed in my mind.
@sheesshoaib3816
@sheesshoaib3816 7 месяцев назад
Its like chandler bing's blah balh blahh
@faye_yao
@faye_yao 4 дня назад
🤣here i am in 2024
@fsnaps
@fsnaps 6 месяцев назад
Jim always smiling, makes the lessons so much more interesting
@asjadsalahuddin5918
@asjadsalahuddin5918 4 года назад
Made it so easy to understand , great work.
@ahmedalhallag3338
@ahmedalhallag3338 2 года назад
I can't believe that the father of all computer networks papers and courses has only 1.1k subscribers :(
@vishweshgk6752
@vishweshgk6752 2 года назад
Ong 😩
@daroboro5137
@daroboro5137 Год назад
10k after 1 year, so it's not so bad
@alkskillz7335
@alkskillz7335 7 месяцев назад
Your generation were just lacking. Dw GenZs here to fix yall 😂
@Felipe-53
@Felipe-53 Год назад
Thank you for blessing us with such well crafted lessons!
@MayCodeGuide
@MayCodeGuide Год назад
if anyone like me looking for a summery: The video discusses the challenges of reliable communication over an unreliable channel, exploring simple and increasingly realistic channel models. It goes on to explain the development of a reliable data transfer protocol, including the use of checksums and sequence numbers, and differentiates between unidirectional and bidirectional communication. The protocol's finite state machines and operations are also illustrated.
@hitarthmukundraykanakia3137
@hitarthmukundraykanakia3137 3 года назад
This is pure gold!! Thank you so much Professor Ross :)
@advaitamallik7703
@advaitamallik7703 2 года назад
*Kurose. Ross is a different dude.
@suyashmisra7406
@suyashmisra7406 Год назад
He's a little confused but he's got the spirit
@starless9
@starless9 Год назад
21:48 when receiver is in "wait for 1 from below" state and receives a packet from sender with sequence 0 it means... that the sender was looking for the ACK sequence 0 packet from receiver but it was corrupted in transmission. So the sender resends the sequence 0 packet and on receiving it uncorrupted receiver will resend the ACK sequence 0 packet so sender can move on to "wait for 0 from below"
@erayatsz3801
@erayatsz3801 11 месяцев назад
Thanks bro that was very helpful
@LK-xq2jy
@LK-xq2jy 7 месяцев назад
you are smart
@t.sathwik5708
@t.sathwik5708 2 года назад
explained the concepts of the text book in a fun and easy manner
@therahuldange
@therahuldange 16 часов назад
Thanks You For Making it easy, really helpful : )
@ricp
@ricp Год назад
Excellent lesson, thanks a lot, Professor!
@PenguinMaths
@PenguinMaths 3 года назад
Great series!
@janetan9620
@janetan9620 2 года назад
3.4-2: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-vxgH6r-II2Q.html
@compscienthusiast
@compscienthusiast Год назад
I really appreciate breaking this down into FSMs and getting a better understanding of this process. However, I'm wondering how the receiver would know that the checksum is valid, and what would determine a non-corrupt checksum. I've used a checksum comparison in python before in the past but that relied on the sender receiving a packet back and then comparing that the sent and received packets have the same checksum. Using that logic, I'm wondering how we can determine that a packet is valid with a checksum if we don't know what to compare the checksum against. What would I be missing?
@starless9
@starless9 Год назад
Granted I'm new to this topic but I'd think the checksum would be generated independently on the receiver side to compare against the checksum in the packet from sender. This could be done using a hash function similar to what is used with hash tables, applied on the data in the entire packet. With large enough prime numbers used in the hash function so the probability that an uncorrupted packet and corrupted packet will generate the same hash value/checksum will be very low. There is the possibility that the checksum in the packet from sender will be corrupted but that just causes a retransmit...
@hayotkamchiev
@hayotkamchiev 11 месяцев назад
He has great taste in movies :)
@SahilKumar-tj5lk
@SahilKumar-tj5lk Год назад
awesome !! Thanks a lot Professor
@ashishroy4326
@ashishroy4326 9 месяцев назад
Hi GIT students, one night before exam
@abdulrahman2004
@abdulrahman2004 2 месяца назад
i love you man
@mrraddawy176
@mrraddawy176 5 дней назад
Great
@SantoshKumar-lz2ti
@SantoshKumar-lz2ti 2 года назад
Question: at 13:40, for the sender fsm when the sender goes from 'wait for nak or ack' to 'wait for call from above' there is a event rat_rcv(rcvpkt),, does this mean the receiver sends a ACK/NAk messgae in the form of pkt ??
@christio02
@christio02 Год назад
Yes, from the state "sender is waiting for ACK/NAK" from receiver, it only goes to "wait for call from above" when it receives an ACK from the receiver. If it receives a NAK, it will send a packet to the receiver and still be in in the "waiting for ACK/NAK" until it gets an ACK
@nadiahalmutairy5350
@nadiahalmutairy5350 2 года назад
UDP is reliable protocol or not?
@DigaDupSuck
@DigaDupSuck 2 года назад
unreliable
@thinkos6730
@thinkos6730 2 года назад
The Protocol itself is unreliable. But you can make adjustments just as in the video on the application Layer Level to implement a reliable Service
@nitheshravikumar9462
@nitheshravikumar9462 Год назад
why do we send the packet through the unreliable channel ?
@bryan0x05
@bryan0x05 Год назад
We can't just hope the channel is reliable every time, we need to be prepared to deal with an unreliable channel. This is how you compensate for that.
@vishweshgk6752
@vishweshgk6752 2 года назад
Sir I am big fan 🥰
@sandeepnbhandarkar4164
@sandeepnbhandarkar4164 2 года назад
Bigger fan sir
@zakariaabdi1818
@zakariaabdi1818 2 года назад
How can bits be flipped ; Error with the hardware link layer(fibre optic for example)?
@abcde9421
@abcde9421 2 года назад
During link transmission , and during storage in router memory
@SantoshKumar-lz2ti
@SantoshKumar-lz2ti 2 года назад
ar 22:03 if it sends ACK , then the receiver will be like, now i should send next pkt so 1 is lost....is the sequnece 01010101?
@LeeLee-vk2dz
@LeeLee-vk2dz Год назад
Save my life
@delee8450
@delee8450 7 месяцев назад
i hope i find it earlier
@mario999kart
@mario999kart 2 года назад
In refer to important digital reliable data transfer, like digital money, value and important information (documents, ownership rights) exchange in the same setting, doesn't blockchain and PoW fit in here perfectly?
@LouettaMcinturf
@LouettaMcinturf Месяц назад
5141 Satterfield Mission
@devmahad
@devmahad Год назад
rdt 1 - 2
@coolalgorithms
@coolalgorithms 8 месяцев назад
NAK or NACK? I thought it was NACK
@dev_jun
@dev_jun Год назад
🥰
@cby1189
@cby1189 Год назад
goat
@karanpreetsingh5966
@karanpreetsingh5966 2 года назад
Chemistry is you touching my arm and setting fire to my mind.
@Shashank9706
@Shashank9706 Год назад
:)
@wubbalubbadubdub588
@wubbalubbadubdub588 4 месяца назад
Wubba Dubba
@AkashdeepDixit-x2h
@AkashdeepDixit-x2h 9 месяцев назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-nyUHUtmxWg0.html
@SantoshKumar-lz2ti
@SantoshKumar-lz2ti 2 года назад
ar 22:03 if it sends ACK , then the receiver will be like, now i should send next pkt so 1 is lost....is the sequnece 01010101?
@SantoshKumar-lz2ti
@SantoshKumar-lz2ti 2 года назад
ar 22:03 if it sends ACK , then the receiver will be like, now i should send next pkt so 1 is lost....is the sequnece 01010101?
Далее
3.4-2 Principles of Reliable Data Transfer  (Part 2)
20:52
2.1 Principles of the Application Layer
24:29
Просмотров 126 тыс.
3.3 Connectionless Transport: UDP
12:20
Просмотров 84 тыс.
Each layer of the OSI model and TCP/IP explained.
19:48
Linux File System/Structure Explained!
15:59
Просмотров 4,2 млн
4.3 The Internet Protocol, part 1
30:14
Просмотров 99 тыс.