background image
18
Chapter 1
Internetworking
The final segment is also an acknowledgment. It notifies the destina-
tion host that the connection agreement has been accepted and that
the actual connection has been established. Data transfer can now begin.
Sounds pretty simple, but things don't always flow so smoothly. Some-
times during a transfer, congestion can occur because a high-speed computer
is generating data traffic a lot faster than the network can handle transfer-
ring. A bunch of computers simultaneously sending datagrams through a
single gateway or destination can also botch things up nicely. In the latter
case, a gateway or destination can become congested even though no single
source caused the problem. In either case, the problem is basically akin to
a freeway bottleneck--too much traffic for too small a capacity. It's not
usually one car that's the problem; there are simply too many cars on that
freeway.
Okay, so what happens when a machine receives a flood of datagrams too
quickly for it to process? It stores them in a memory section called a buffer.
But this buffering action can only solve the problem if the datagrams are part
of a small burst. If not, and the datagram deluge continues, a device's mem-
ory will eventually be exhausted, its flood capacity will be exceeded, and it
will react by discarding any additional datagrams that arrive.
No huge worries here, though. Because of the transport function, network
flood control systems actually work quite well. Instead of dumping resources
and allowing data to be lost, the transport can issue a "not ready" indicator
to the sender, or source, of the flood (as shown in Figure 1.6). This mecha-
nism works kind of like a stop light, signaling the sending device to stop
transmitting segment traffic to its overwhelmed peer. After the peer receiver
processes the segments already in its memory reservoir--its buffer--it sends
out a "ready" transport indicator. When the machine waiting to transmit
the rest of its datagrams receives this "go" indictor, it then resumes its
transmission.
In fundamental, reliable, connection-oriented data transfer, datagrams
are delivered to the receiving host in exactly the same sequence they're
transmitted--and the transmission fails if this order is breached! If any data
segments are lost, duplicated, or damaged along the way, a failure will transmit.
This problem is solved by having the receiving host acknowledge that it has
received each and every data segment.
Connectionless transfer is covered in Chapter 3.
Copyright ©2002 SYBEX, Inc., Alameda, CA
www.sybex.com