Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Is tcp Connection-oriented?
TCP is connection-oriented. This means a connection is established between source and destination machines before any data is sent it implies that a connection is established and maintained until such time as message or messages to be exchanged by application programs at each end have been exchanged. Connections provided by TCP are known as Virtual Connections. It means that there is not any physical direct connection between computers.
TCP is used along with Internet Protocol to send data in form of message units between computers over Internet. While IP takes care of handling actual delivery of the data, TCP takes care of keeping track of individual units of data (known as Packet) that a message is divided into for efficient routing through Internet. TCP provides for a reliable, connection-oriented data transmission channel between two programs. Reliable means that data sent is guaranteed to reach its destination in order sent or an error would be returned to sender.
For instance, when an HTML file is sent to someone from a Web server, Transmission Control Protocol (TCP) program layer in that server divides the file in one or more packets, numbers the packets after that forwards them individually. Though every packet has same destination IP address, it can get routed differently through network. At the other end (client program in our computer), TCP reassembles individual packets and waits till they have arrived to forward them as a single file.
TCP is responsible for making sure that a message is divided into the packets which IP manages and for reassembling packets back into complete message at the other end. In Open Systems Interconnection (OSI) communication model, TCP is in layer 4, Transport Layer.
What is a zombie? When a program forks and the child finishes before the parent, the kernel still keeps some of its information about the child in case the parent might require
What is binary adder? Binary adder is constructed with full adder circuit linked in cascade, with the output carry from one full adder linked to the input carry of next full ad
Question: Q1) Write a code that asks the user for a positive integer, computes the square root of that integer, and return the result to the user. The computational error needs
How free-space is managed using bit vector implementation? The free-space list is executed as a bit map or bit vector. Each block is shown by 1 bit. If the block is free, the b
Q. Show the advantages of Joint Application Development? The following are the numerous advantages of Joint Application Development: Actively includes management and use
3-variable K-maps have 8 squares which arenormally arranged in 4 columns and 2 rows.Columns are labeled with 2 variables. The columns are arranged so that either A or B cha
Q. What is task identifier? Each and every PVM task is uniquely recognized by an integer known as task identifier (TID) assigned by local pvmd. Messages are received from and s
Directed-Test Methodology Building a directed verification environment with a comprehensive set of directed tests is very time-consuming and difficult. As directed tests only c
what is penetration technique
Ask questiPower and EnergyQuestion 4Consider a processor that runs at 2.5 GHz and 1 Volt. When running a given CPU-bound program,the processor consumes 100 W, of which 20 W is leak
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd