Flow control in TCP, Computer Networking

Q. Flow control in TCP?

  • The amount of data a source is able to send before receiving an ACK from the destination
  • Whether to send 1 byte of data as well as wait for ACK or send all the bytes and wait for the ACK for the complete message?
  • TCP gives a resolution in between
  • Sliding window protocol

- Byte oriented

1668_Flow control in TCP.png

If no window a sender is able to send all bytes without regarding the condition of the receiver

- If data are consumed too gradually then receiver buffer becomes full - drop the packet (retransmit)

- The sender should adjust itself to the number of the free locations in the receiver buffer

Receiver window

257_Flow control in TCP1.png

Posted Date: 7/23/2013 3:12:06 AM | Location : United States

Related Discussions:- Flow control in TCP, Assignment Help, Ask Question on Flow control in TCP, Get Answer, Expert's Help, Flow control in TCP Discussions

Write discussion on Flow control in TCP
Your posts are moderated
Related Questions
Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I

What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine

What is the importance of implementing a Fault Tolerance System? Are there limitations? A fault tolerance system makes sure continuous data availability. This is done by elimin

Path  Overhead It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

master construct #include extern float average(float,float,float); void master_construct ( float* x, float* xold, int n, float tol )  { int c, i, toobig; floa

Explain about the Database Management Intranet This type of Intranet provides everyone in an organisation with the capability to maintain a "real-time" interactive database.

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Data Distribution Data distribution directives tell the compiler how the program data is to be distributed between the memory areas associated with a set of processors. The log

Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of