Packet loss and retransmission in tcp, Computer Networking

Packet loss and retransmission in TCP

TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does not reach, the previous data is retransmitted. This is given in the figure below:

 

 

1075_Packet loss and retransmission in TCP.png

Posted Date: 8/1/2012 11:38:52 AM | Location : United States







Related Discussions:- Packet loss and retransmission in tcp, Assignment Help, Ask Question on Packet loss and retransmission in tcp, Get Answer, Expert's Help, Packet loss and retransmission in tcp Discussions

Write discussion on Packet loss and retransmission in tcp
Your posts are moderated
Related Questions
Half duplex is analogous to a one a lane bridge, it can handle traffic in both directions but no at the similar time.

Which of the following protocols are used for logical network addressing? Ans) Internet Protocol - IP gives routing and a one interface to the upper layers. No upper layer proto

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly. The server must simply send a positive command res

i want a program of hierarchical programming in c language with its output. please help me .

Q. What is Transmission Control Protocol? Transmission Control Protocol TCP Services - Stream delivery service Permits the sending process to deliver data as a stream

PROBLEM WITH BROADCASTING: There are some issues with the broadcast. For each broadcast frame on the network every computer uses computational sources and places the data into

Switched Ethernet In switched networks a switch device identifies the destination address and routes the frame to the specific port to which the destination station is conn

Brigdes Introduction - LAN may require to cover more distance than the media can handle effectively or - Number of stations may perhaps be too great for efficient frame d

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Explain in brief about the Throughput The medium access control protocol should make as well-organized use as possible of the wireless medium to maximize capacity. Number of