Explain that lost acknowledgement in packet retransmission, Computer Engineering

Assignment Help:

Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet.

To guarantee reliable transfer, protocols utilize positive acknowledgement along with retransmission. Whenever receiver acquires the packet an acknowledgement is sent.

Generally packet is retransmitted, if an acknowledgement is lost. Retransmission cannot succeed if a hardware failure has lastingly disconnected the network or if getting computer has crashed. Hence, protocols retransmitting the messages bound the maximum number of transmissions. While the bound has been reached, the protocol stops retransmission of packet still if acknowledges is not acquired. Hence, lost acknowledgement does not necessarily enforce retransmission of packet.


Related Discussions:- Explain that lost acknowledgement in packet retransmission

What types of calendars can you create with google calendar, What types of ...

What types of calendars can you create with Google Calendar? Personal calendars, like default calendar Public calendars, which others can access through the web

Write a short note on structure chart, Write a short note on structure char...

Write a short note on structure chart.    Structure Chart is an significant program design method and it shows all components of code in a hierarchical format

What you mean by organizational effectiveness, Q. What you mean by organiza...

Q. What you mean by organizational effectiveness? Organizational effectiveness is measured in terms of productivity, structural flexibility, Employee involvement and Job satisf

State about agp, State about AGP The latest addition to many computer s...

State about AGP The latest addition to many computer systems is the inclusion of accelerated graphics port (AGP). AGP operates at the bus clock frequency of the microprocessor.

Importance of artificial intelligence, Businesses are interested in AI bec...

Businesses are interested in AI because of the characteristics it offers that no other systems type offers. That is AI ability to: a. Preserve Intelligence and Knowledge: C

Example of calculate maximum access time & cost of switch, Calculate the ma...

Calculate the maximum access time that can be permitted for the data and control memories in a TSI switch with a single input and single output trunk multiplexing 2500 channels. Al

Microprocesseor, In8085 are of the following statements is not true.A) Co-p...

In8085 are of the following statements is not true.A) Co-processor is interfaced in max mode. B) Co-processor is interfaced in MIN mode C )Co-processor is interfaced in max/min mod

Properties of electronic cash, Properties : 1.  Monetary Value: Monetar...

Properties : 1.  Monetary Value: Monetary value must be backed by also cash, bank - authorized credit cards or bank certified cashier's cheque. 2.  Interoperability: E-cash

Scanning tips, Don't scan at more resolution than needed. This saves both D...

Don't scan at more resolution than needed. This saves both Disk and time Space. Typically itisn't useful to scan at more than optical resolution because it adds no new informa

#title., Ask queCreate a telephone directory. The heading should be 16-poi...

Ask queCreate a telephone directory. The heading should be 16-point Arial Font in bold The rest of the document should use 10-point font size Otherheadingsshould use 10-point Cour

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd