Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How congestion is controlled in TCP?
One of the most significant aspects of TCP is a mechanism for congestion control. In main modern internets, extreme long delays or packet loss are more probable to be caused through congestion than a hardware failure.
Interestingly, transports protocols which retransmit can exacerbate the problem of congestion through injecting further copies of a message.
To ignore such a problem, TCP all the time uses packet loss as a measure of congestion and responds to congestion through reducing the rate at that it retransmits data.
TCP doesn't compute a specific transmission rate. In place, TCP bases transmission on buffers. It is the receiver advertises a window size and the sender can transmit data to fill the receiver's window before received an ACK. To control the data rate, TCP inflicts a restriction on the window size - through temporarily reducing the window size, the sending TCP effectively decreases the data rate.
TCP congestion control takes over while a message is lost. In place of retransmitting adequate data to fill the receiver's buffer as the receiver's window size, TCP starts through sending a particular message having data. If the acknowledgement arrives without any additional loss, TCP doubles the amount of data to be sent and sends two additional messages. TCP sends four more and the rest, if acknowledgement arrives for those two.
Q. Explain use of MPI functions with an example? include int main(int argc, char **argv) { int i, tmp, sum, s, r, N, x[100]; MPI_Init(&argc, &argv); MPI_Comm_size
Q. Find out if a particular file is available in a disk in DOS? Sometimes you may like to find out if a particular file is available in a disk. In that case, you can identify t
Can math operations be performed on a void pointer? No. Pointer addition and subtraction are based on advancing the pointer by a number of elements. By explanation, if you have
Suppressing the number signs (+/-) is carried out using the addition NO-SIGNS to the Write statement. Statement is false.
Define software architecture and describe which types of architectures can be used in Email or Facebook applications
Q. Operation codes used in assembly instructions? Now let's describe various operation codes needed for this machine so that we can translate High level language instructions t
What is Fork swap? "Fork ()" is a system call to make a child process. When the parent process calls "fork()" system call, the child process is formed and if there is short of
Shifting a register content to left by one bit position is equivalent to ? Ans. Multiplication by two is equivalent while shifting register content to left by one bit position.
Example of Variables and quantifiers: We should have started with something such which reflects the fact that we're really talking for some meal at the Red Lion, neverthe
Face Scanning Security System - Biometric Computer Security Systems Finally, face scanning security system are also one of biometric technologies. Generally, the principle of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd