Receive window - transport layer, Computer Networking

Receive Window

This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means  that the maximum  size of  the window  is 65, 535 bytes. This  value  is normally referred to as the  receiving  window  is determined by the  receiver. The sender  must obey  the  direction of the  receiver in this  case.

Posted Date: 3/12/2013 11:35:47 PM | Location : United States







Related Discussions:- Receive window - transport layer, Assignment Help, Ask Question on Receive window - transport layer, Get Answer, Expert's Help, Receive window - transport layer Discussions

Write discussion on Receive window - transport layer
Your posts are moderated
Related Questions

10Base2 - Thinnet Cable diameter is about 0.64 cm (RG-58) More flexible as well as easier to handle and install than Thicknet "2" represents a maximum segment len

Whenever it manage a packet, IP software requires to separate the receiver address into a suffix and prefix. Classful internet addresses are self-identifying because the class of t

Describe Network Topology and VPN Network Topology refers to the layout of a computer network. It presents how devices and cables are physically laid out, as well as how they j

Configure VTP Pruning on the Switches VTP pruning permits a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN

Explain about the Integrating Intranet These Intranets are designed to replace the complexity of in-house communications and processing systems that large organisations ofte

DNS Tunneling – Domain Name Server "If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, th

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all