Data transfer - tcp connection management , Computer Networking

Data Transfer

After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  shows an example  in this example  after  connection is established  the client  sends 2000 bytes in two  segments. The  server  than send 2000bytes  in one  segment. The client   sends one more segment. The  first  three segments carry  both  data and  acknowledgment, but  the last segment  carries only an  acknowledgment because there are o more data to be sent. Note the value of the sequence and acknowledgment numbers. The data segments sent by  the client  have the PSH flag  set so  that the server TCP knows  to deliver data  to the server process as soon  as they  are received. The segment  from  the server on the  other hand does not  set the  push   flag. Most TCP implementation have  the options  to set  or not set  this flag.

Posted Date: 3/13/2013 12:56:21 AM | Location : United States







Related Discussions:- Data transfer - tcp connection management , Assignment Help, Ask Question on Data transfer - tcp connection management , Get Answer, Expert's Help, Data transfer - tcp connection management Discussions

Write discussion on Data transfer - tcp connection management
Your posts are moderated
Related Questions
What is Network Server? Network Server is a computer in Network that is designated to give one or more network service. For instance file server, database server etc.

Optimizing STP  Because there is a separate instance of the spanning tree for every active VLAN, a separate root election is conducted for each instance. If the default switch p

Q. What do you mean by Flow Control? - How much data sender is capable to transmit before receiving the ACK - Why flow control? - Limitation with receiver 1. Processin

Q. Explain Dynamic Domain Name System? DDNS - Dynamic Domain Name System automatically updates the DNS master file - Sent by DHCP to a primary DNS server; secondary se

Is a complete OSI/TCPIP network architecture available in MATLAB?

Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to tran

In connectionless schema, there is no connection required. The source of data includes destination information in data and transmit to the network. Network transmit each data item


Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Message passing is probably the most extensively used parallel programming paradigm today. It is the mainly natural, portable and efficient approach for distributed memory systems.