Example on multiplicative decrease, Computer Networking

Assignment Help:

Q. Example on Multiplicative Decrease?

w = 1

for (each new ACK received)

w = w+1

until (loss detected or w >= ssthresh)

2311_Example on Multiplicative Decrease.png

Not so slow

- Exponential increase in transmission rate.

Continues until:

- Loss detected or...

- w > ssthresh

At first, we don't know what ssthresh is.

- Will carry on until a loss is detected.

- ssthresh = w / 2

- Restart slowstart.

  • Optimistically makes it to ssthresh before another loss.

Related Discussions:- Example on multiplicative decrease

Transport layer protocols , TCP (Transmission Control Protocol) and UDP are...

TCP (Transmission Control Protocol) and UDP are used by TCP/IP. SPX (Sequenced Packet Exchange) is used with IPX. NBP (Name Binding Protocol) is used with Appletalk.

Compute shortest path, Compute the shortest path from t to all network node...

Compute the shortest path from t to all network nodes.

Compare Intranet with Internet and LAN, Intranet vs Internet vs LAN It...

Intranet vs Internet vs LAN It is certainly possible that both Intranets and the Internet can coexist. As spelt theoretically, the entire Intranet could be located at a remote

Computer Networking help, Hello, I have a question which is due tomorrow (2...

Hello, I have a question which is due tomorrow (2/15/2013) at 11:55pm. The configuration portion of the exercise has been completed. I only need the questions in bold answered (onl

SAN, Case study on SAN Providers and Products available in the market.

Case study on SAN Providers and Products available in the market.

Networking concepts and applications, iLab 2: Office Network Expansion ...

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Define the microcells- routing and switching, Microcells As cells becom...

Microcells As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of small buildings or the sides of large buildings, and finally to lamp

System analysis, explain the appropriateness of economic and behavioral fea...

explain the appropriateness of economic and behavioral feasibility

Encrypted with a symmetric key, Alice sends a message to Bob, encrypted wit...

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd