Ack received - trasnport layer, Computer Networking

ACK Received

If an ACK is received by the  sender. The  SR sender marks  that packet  as having  been received by the receiver.

Posted Date: 3/12/2013 11:08:32 PM | Location : United States







Related Discussions:- Ack received - trasnport layer, Assignment Help, Ask Question on Ack received - trasnport layer, Get Answer, Expert's Help, Ack received - trasnport layer Discussions

Write discussion on Ack received - trasnport layer
Your posts are moderated
Related Questions
Concept Of Permutation Network In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and po

Categories of traditional Ethernet a)  Baseband - digital signals using Manchester encoding b) 10Base2, 10-Base-T, 10Base5, 10Base-FL c)  First number signifies data rate

Unbound Transmission Media Unbound transmission media extend beyond the limiting confines of cabling. They give a good communication alternative for WANS. The lack of physical

Memory Pools IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until


In connectionless schema, there is no connection required. The source of data includes destination information in data and transmit to the network. Network transmit each data item

QUESTION a) List the seven layers of the ISO-OSI model and briefly describe the role of each layer b) Describe the functions of the following intermediate systems- Rep

In distributed routing computation, every packet switch calculates its routing table locally and transmit messages to the neighbors. It also updates information regularly. If a pac

Q. Illustrate the Advantages of VLANs? - Cost and time reduction in moving stations from one group to another - Creation of virtual workgroups - Security Position of