Flow control in TCP, Computer Networking

Assignment Help:

Q. Flow control in TCP?

  • The amount of data a source is able to send before receiving an ACK from the destination
  • Whether to send 1 byte of data as well as wait for ACK or send all the bytes and wait for the ACK for the complete message?
  • TCP gives a resolution in between
  • Sliding window protocol

- Byte oriented

1668_Flow control in TCP.png

If no window a sender is able to send all bytes without regarding the condition of the receiver

- If data are consumed too gradually then receiver buffer becomes full - drop the packet (retransmit)

- The sender should adjust itself to the number of the free locations in the receiver buffer

Receiver window

257_Flow control in TCP1.png


Related Discussions:- Flow control in TCP

What is the importance of encryption on a network, What is the importance o...

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o

TRAFFIC CONGESTION, Can I get help for data analysis on traffic congestion ...

Can I get help for data analysis on traffic congestion using GIS

Name the default lmi type, Cisco is the defaul LMI type. There are thre...

Cisco is the defaul LMI type. There are three types of LMI standards:  ANSI - Annex D defined by ANSI standard T1.617  ITU-T (Q.933A) - Annex A defined by Q933A  Cisco

What is oltp, In the transaction server, the client component usually consi...

In the transaction server, the client component usually consists of GUI and the server components usually having of SQL transactions against a database. These applications are know

Determine about the tree topology, Determine about the Tree Topology A ...

Determine about the Tree Topology A generalization of the bus topology. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point kno

Explain the wireless standards, Problem 1: (a) Briefly explain each of...

Problem 1: (a) Briefly explain each of the following wireless standards: (i) WiFi (ii) WiMAX (iii) 3G. Problem 2: (b) Bluetooth is an industrial specific

Explain the public-key cryptography, Q. Explain the Public-Key Cryptography...

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd