Data transfer - tcp connection management , Computer Networking

Data Transfer

After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  shows an example  in this example  after  connection is established  the client  sends 2000 bytes in two  segments. The  server  than send 2000bytes  in one  segment. The client   sends one more segment. The  first  three segments carry  both  data and  acknowledgment, but  the last segment  carries only an  acknowledgment because there are o more data to be sent. Note the value of the sequence and acknowledgment numbers. The data segments sent by  the client  have the PSH flag  set so  that the server TCP knows  to deliver data  to the server process as soon  as they  are received. The segment  from  the server on the  other hand does not  set the  push   flag. Most TCP implementation have  the options  to set  or not set  this flag.

Posted Date: 3/13/2013 12:56:21 AM | Location : United States







Related Discussions:- Data transfer - tcp connection management , Assignment Help, Ask Question on Data transfer - tcp connection management , Get Answer, Expert's Help, Data transfer - tcp connection management Discussions

Write discussion on Data transfer - tcp connection management
Your posts are moderated
Related Questions
Screening Router In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the c

.test a number to be prime number in network security

Q. What is Transmission Media? - Actually situated below the physical layer - Directly controlled through the physical layer - Data should be converted into electromagnet

Reliability is the probability of success ; where success is defined as compliance to specified requirements. A system or an item is considered reliable if it performs satisfactori


Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

Data Parallel Programming In the data parallel programming model, main focus is on performing simultaneous operations on a data set. The data set is typically prepared into a c

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Persistent and No persistent Connections HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections. Persistent Connections

Question: (a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b) What is the initia