Retransmission of packets - transport layer, Computer Networking

Retransmission of packets

The disadvantage  of thronging away a correctly received packet is that  the subsequent retransmission  of the  packet might  be lost  or garbled and thus even  more retransmission  would be required.

Posted Date: 3/12/2013 12:05:17 AM | Location : United States







Related Discussions:- Retransmission of packets - transport layer, Assignment Help, Ask Question on Retransmission of packets - transport layer, Get Answer, Expert's Help, Retransmission of packets - transport layer Discussions

Write discussion on Retransmission of packets - transport layer
Your posts are moderated
Related Questions
What are TP-Lite and TP-Heavy Monitors? TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy is TP Monitors which handles the Client/S

What must be true for two Routers running IGRP to communicate their routes? Ans) Similar autonomous system number

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

Explain the concept of router-root path The mean router-router path is double the mean router-root path. Number levels of tree with root as 1 and the deepest level as n. The pa

Q. Why it is essential to have layering in a network? Ans: A computer network is a very complicated system. It becomes very hard to implement as a single entity. The layered ap

A. Current setting A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities a


What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

Q. Comparison and Contrast between the OSI and TCP-IP Model? This presentation would discuss a few comparison and contrast between the 2 main reference models which use the con

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all