Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Is tcp Connection-oriented?
TCP is connection-oriented. This means a connection is established between source and destination machines before any data is sent it implies that a connection is established and maintained until such time as message or messages to be exchanged by application programs at each end have been exchanged. Connections provided by TCP are known as Virtual Connections. It means that there is not any physical direct connection between computers.
TCP is used along with Internet Protocol to send data in form of message units between computers over Internet. While IP takes care of handling actual delivery of the data, TCP takes care of keeping track of individual units of data (known as Packet) that a message is divided into for efficient routing through Internet. TCP provides for a reliable, connection-oriented data transmission channel between two programs. Reliable means that data sent is guaranteed to reach its destination in order sent or an error would be returned to sender.
For instance, when an HTML file is sent to someone from a Web server, Transmission Control Protocol (TCP) program layer in that server divides the file in one or more packets, numbers the packets after that forwards them individually. Though every packet has same destination IP address, it can get routed differently through network. At the other end (client program in our computer), TCP reassembles individual packets and waits till they have arrived to forward them as a single file.
TCP is responsible for making sure that a message is divided into the packets which IP manages and for reassembling packets back into complete message at the other end. In Open Systems Interconnection (OSI) communication model, TCP is in layer 4, Transport Layer.
Conversion of Decimal Number to Binary Number: For converting a decimal number to binary integer part and fractional part are handled separately. Let's describe it with help of
The sorting method where array to be sorted is partitioned again and again in such a way that all elements less than or equivalent to partitioning element appear before it and thos
Cheques vs Credit Cards E-cheques: E-cheques are used for business dealing in e-commerce. Transactions of these cheques take place on Internet. In this system the elect
Q. Show the Features of Hyper-threading? The significant characteristics of hyper threading are: i) Improved response time and reaction, as well as increased number of users
What is a Size Category? The Size category verifies the probable space needs of the table in the database.
What is major difference between the Historic Unix and the new BSD release of Unix System V in terms of Memory Management? Historic Unix uses Swapping - Whole process is tran
Define the Abstraction of OOA Now, let us see how objects can be seen as a problem, and find their associated data and their behaviour. You will notice that an object is an ab
Reprographic Methods i) Thermography ii) Dyeline jii) Microfiche iv) Fax In this unit you have learnt that: Used for Methods of reprography are used for the
State about movable joystick In another type of movable joystick, the stick is used to activate switches that cause the screen cursor to move at a constant rate in the selected
What is the advantage of caching in a web browser? Like other application browsers utilize a cache to enhance document access. The browser places a copy of all items it retriev
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd