Receive window - transport layer, Computer Networking

Receive Window

This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means  that the maximum  size of  the window  is 65, 535 bytes. This  value  is normally referred to as the  receiving  window  is determined by the  receiver. The sender  must obey  the  direction of the  receiver in this  case.

Posted Date: 3/12/2013 11:35:47 PM | Location : United States

Related Discussions:- Receive window - transport layer, Assignment Help, Ask Question on Receive window - transport layer, Get Answer, Expert's Help, Receive window - transport layer Discussions

Write discussion on Receive window - transport layer
Your posts are moderated
Related Questions
Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co

- Lost as well as delayed ACKs - Bidirectional transmission both side needs both sending and receiving windows Note: In selective repeat ARQ the size of the sender and rece

Q. Describe about Data Communications? - Data - Information presented in whatsoever form is agreed upon by the parties creating and using the data - Data Communications - ex

Q. How is computer networks used in sales and marketing?  Marketing and sales:   Computer networks are used extensively in both marketing and sales organizations. Marketing pr

Configure a Wireless MAC Filter Step: Add a Mac filter. Navigate back to the web utility page of the router ( Navigate to the Wireless section a

What are General Middleware? It contains the communication stacks, authentication services, distributed directories, network time, RPC, Queuing services with the network OS ext

Factor Causing Parallel Overheads Figure clearly explains that the performance metrics are not able to achieve a linear curve in comparison to the enhance in number of process

Q. Show Concept Of Permutation Network? In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nod

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det