Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How congestion is controlled in TCP?
One of the most significant aspects of TCP is a mechanism for congestion control. In main modern internets, extreme long delays or packet loss are more probable to be caused through congestion than a hardware failure.
Interestingly, transports protocols which retransmit can exacerbate the problem of congestion through injecting further copies of a message.
To ignore such a problem, TCP all the time uses packet loss as a measure of congestion and responds to congestion through reducing the rate at that it retransmits data.
TCP doesn't compute a specific transmission rate. In place, TCP bases transmission on buffers. It is the receiver advertises a window size and the sender can transmit data to fill the receiver's window before received an ACK. To control the data rate, TCP inflicts a restriction on the window size - through temporarily reducing the window size, the sending TCP effectively decreases the data rate.
TCP congestion control takes over while a message is lost. In place of retransmitting adequate data to fill the receiver's buffer as the receiver's window size, TCP starts through sending a particular message having data. If the acknowledgement arrives without any additional loss, TCP doubles the amount of data to be sent and sends two additional messages. TCP sends four more and the rest, if acknowledgement arrives for those two.
Compute minimum value of the horizontal force: Block A of weight 520N rest on horizontal top of block B having weight of 700N as shown in the figure given below. Block A
The GNU Image Manipulation Program, or GIMP, is a raster graphics editor application with some support for vector graphics. GIMP is used to process digital graphics & photographs.
Conversion of fractional number 0.6875 into its equivalent binary number ? Ans. Multiply the fractional number 0.6875 with 2 until the remainder becomes 0 that is, Ther
A router connects to at most K networks. How many routers R are required to connect to N networks? Derive an equation that gives R in terms of N and K. If N K and K >=2 this
Illustrated three stages of data mining process? Stage 1: Exploration: This stage generally starts along with data preparation that may involve cleaning data, selecting subse
Sript-Fu is the first GIMP scripting extension. Extensions are split processes that communicate with the GIMP in the similar way that plug-ins do. The distinction is that extension
Cluster is said to be collection of queue manager's logically linked together to balance the load on the remote machine (i.e if it is remote queue managers which processes your mes
Vector Processing with Pipelining: Since in vector processing, vector instructions perform the similar computation on dissimilar data operands repeatedly, vector processing is most
Extend task 1 so that it now supports a memory buffer of limited size. Provide the same functionality as task 1 except now make the server work with a limited buffer size. Like
Explain topology method used in LAN technology in detail. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd