How congestion is controlled in tcp, Computer Engineering

Assignment Help:

How congestion is controlled in TCP?

One of the most significant aspects of TCP is a mechanism for congestion control. In main modern internets, extreme long delays or packet loss are more probable to be caused through congestion than a hardware failure.

Interestingly, transports protocols which retransmit can exacerbate the problem of congestion through injecting further copies of a message.

To ignore such a problem, TCP all the time uses packet loss as a measure of congestion and responds to congestion through reducing the rate at that it retransmits data.

TCP doesn't compute a specific transmission rate. In place, TCP bases transmission on buffers. It is the receiver advertises a window size and the sender can transmit data to fill the receiver's window before received an ACK. To control the data rate, TCP inflicts a restriction on the window size - through temporarily reducing the window size, the sending TCP effectively decreases the data rate.

TCP congestion control takes over while a message is lost. In place of retransmitting adequate data to fill the receiver's buffer as the receiver's window size, TCP starts through sending a particular message having data. If the acknowledgement arrives without any additional loss, TCP doubles the amount of data to be sent and sends two additional messages. TCP sends four more and the rest, if acknowledgement arrives for those two.


Related Discussions:- How congestion is controlled in tcp

Write a verilog code to swap contents of two registers, Write  a  verilog  ...

Write  a  verilog  code  to  swap  contents  of  two registers  with  and without  a  temporary register? With temp reg : always @ (posedge clock) begin temp=b; b

The goal of hashing, The goal of hashing is to produce a search that takes ...

The goal of hashing is to produce a search that takes   O(1) time

Explain procedure level of parallel processing, Procedure Level Here, p...

Procedure Level Here, parallelism is obtainable in the form of parallel executable procedures. In that case, design of algorithm plays a key role. E.g. every thread in Java is

Salient features of direct addressing mode, Q. Salient features of direct a...

Q. Salient features of direct addressing mode? A number of salient points about this technique are: This scheme offers a limited address space since if address field has

The six various application of stack, The six several application of stack ...

The six several application of stack in computer application is: 1.  Conversion of infix to postfix notation and vice versa. 2.  Evaluation of arithmetic expression. 3.

BCD ADDER, create a BCD adder combinational ckt. that adds 2 digit BCD inpu...

create a BCD adder combinational ckt. that adds 2 digit BCD inputs

Order in which filters get implemented, If we have multiple filters implet...

If we have multiple filters impleted, what is the order in which these filters get implemented?   Ans) 1. Authorization filters 2. Response filters 3. Action filters

What are the primary models of supply chain management, What are the primar...

What are the primary models of Supply Chain Management? Two Primary models of Supply Chain Management are illustrated below: a. Porter’s Value Chain Model and b. Supply

What is artificial intelligence recognition, There are two goals to AI; the...

There are two goals to AI; the major one is to produce an artificial system that is about as good as or good than a human being at dealing with the actual world. The second goal is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd