Data transfer - tcp connection management , Computer Networking

Data Transfer

After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  shows an example  in this example  after  connection is established  the client  sends 2000 bytes in two  segments. The  server  than send 2000bytes  in one  segment. The client   sends one more segment. The  first  three segments carry  both  data and  acknowledgment, but  the last segment  carries only an  acknowledgment because there are o more data to be sent. Note the value of the sequence and acknowledgment numbers. The data segments sent by  the client  have the PSH flag  set so  that the server TCP knows  to deliver data  to the server process as soon  as they  are received. The segment  from  the server on the  other hand does not  set the  push   flag. Most TCP implementation have  the options  to set  or not set  this flag.

Posted Date: 3/13/2013 12:56:21 AM | Location : United States







Related Discussions:- Data transfer - tcp connection management , Assignment Help, Ask Question on Data transfer - tcp connection management , Get Answer, Expert's Help, Data transfer - tcp connection management Discussions

Write discussion on Data transfer - tcp connection management
Your posts are moderated
Related Questions
i need help with this assigmnet reply asap please

Explain Network Services Network services are the thing that a network can do. The main networking services are File Services: This contains file transfer, storage, data m

Q. Show the Bidirectional Transmission? Bidirectional Transmission Each party must maintain S and R to track frames sent and expected Piggybacking hooking ACK wit

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that


Describe the term - Certification Authority The certification is most easily implemented with a custom solution combined with a server, called the Certification Authority (CA).

bus topology disadvantage?


Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

What is the Network Time Protocol? A protocol that makes sures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is c