Options - transport layer, Computer Networking

Options

The options  fields may be  used to  provide  other functions that are not  covered by  the header. If the length  of the  options  field is not  a multiple of 32 bits  extra  padding  bits will be added. The most  important   option  is used by  the sender  to indicate the  maximum segment  size it can accept. This option  is specified during  connection setup.

Posted Date: 3/12/2013 11:39:11 PM | Location : United States







Related Discussions:- Options - transport layer, Assignment Help, Ask Question on Options - transport layer, Get Answer, Expert's Help, Options - transport layer Discussions

Write discussion on Options - transport layer
Your posts are moderated
Related Questions
Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no

This example illustrate the use of lastprivate clause void for_loop (int n, float *a, float *b) { int i; #pragma omp parallel { #pragma omp for lastprivate(i) for

Explain clustering support Clustering support refers to the ability of a network operating system to link multiple servers in a fault-tolerant group. The main purpose of this i

Data Link Layer Sub layers ·  Logical Link Control (LLC) - upper layer · Handles control information, logical addressing and data · MAC (Medium Access Control) - lower layer ·

Explain the meaning of Negotiation Negotiation is process of getting both sides to agree on some values or parameters to be used during communication. Maximum packet size is on

A socket is an abstraction that shows an endpoint of communication. Most applications that consciously use TCP and UDP do so by making a socket of the appropriate type and then per


What are the drawbacks of wireless devices One drawback is security. Every random delivery man who happens to be in building can listen on network. Another weakness is reliabil

Q. Define Name Space in domain name system? - All names assigned to machines on an internet - Must be unique; either flat or hierarchical - Flat name space - name is assi

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover