Data transfer - tcp connection management , Computer Networking

Data Transfer

After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  shows an example  in this example  after  connection is established  the client  sends 2000 bytes in two  segments. The  server  than send 2000bytes  in one  segment. The client   sends one more segment. The  first  three segments carry  both  data and  acknowledgment, but  the last segment  carries only an  acknowledgment because there are o more data to be sent. Note the value of the sequence and acknowledgment numbers. The data segments sent by  the client  have the PSH flag  set so  that the server TCP knows  to deliver data  to the server process as soon  as they  are received. The segment  from  the server on the  other hand does not  set the  push   flag. Most TCP implementation have  the options  to set  or not set  this flag.

Posted Date: 3/13/2013 12:56:21 AM | Location : United States







Related Discussions:- Data transfer - tcp connection management , Assignment Help, Ask Question on Data transfer - tcp connection management , Get Answer, Expert's Help, Data transfer - tcp connection management Discussions

Write discussion on Data transfer - tcp connection management
Your posts are moderated
Related Questions
Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

Discuss  about the JPEG and LDAP JPEG: Stands for Joint Photographic Experts Group.  A standard format of storing digitized, colour, or black-and-white photographs. JPEG fi

A statistical encoding algorithm is being considered for the transmission of a large number of long text files over a public network. Part of the file content is as follows: DOD

What is Frequency borrowing In the simplest case, frequencies are taken from adjacent cells by congested cells. The frequencies can also be assigned to cells dynamically.

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Define Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is called as co-axial cable. The shie

We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these

Q. Show Data link and Physical vs Subnet? - Data link layer The function of the Data Link Layer is -offers for the control of the physical layer and detects and possib

Fiber Optic Cable A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts