Example on multiplicative decrease, Computer Networking

Assignment Help:

Q. Example on Multiplicative Decrease?

w = 1

for (each new ACK received)

w = w+1

until (loss detected or w >= ssthresh)

2311_Example on Multiplicative Decrease.png

Not so slow

- Exponential increase in transmission rate.

Continues until:

- Loss detected or...

- w > ssthresh

At first, we don't know what ssthresh is.

- Will carry on until a loss is detected.

- ssthresh = w / 2

- Restart slowstart.

  • Optimistically makes it to ssthresh before another loss.

Related Discussions:- Example on multiplicative decrease

Determine the value of slow start threshold, Assuming that TCP Reno is used...

Assuming that TCP Reno is used, consider the following diagram illustrating the behaviour of congestion window, and answer the questions below. a)  What was the value of sl

Packet, a transperent switch is inserted between two local area networks AB...

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Bens network, Bens Network  Ben's network is a non-blocking network. ...

Bens Network  Ben's network is a non-blocking network.  It is a different  type of Clos network where initial and final stage consists of  2×2 switches (for n input  and m ou

Explain the term instruction pipelines, Instruction Pipelines The strea...

Instruction Pipelines The stream of instructions in instruction execution cycle may be realized by a pipeline where overlapped executions of various operations are performed. T

Topology-tcp and udp sources, To relieve some programming burden, project 5...

To relieve some programming burden, project 5 is a group project that two students can form a group to do and submit one report. In your submitted report, please specify who is you

Internet architecture, Company seldom uses a single router to connect its e...

Company seldom uses a single router to connect its entire network for two purpose. Because the router must transmit every packet, the processor in a provided router is insuff

Comp architecture, In reg-mem architecture, clock cycle is 10 ns wide. It i...

In reg-mem architecture, clock cycle is 10 ns wide. It is proposed that reg-reg architecture be used instead, that reduces the clock cycle by 2 ns. However, it requires an addition

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

What are the basic key functions of data link layer, Q. What are the basic ...

Q. What are the basic key functions of data link layer? Ans: Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd