Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Is tcp Connection-oriented?
TCP is connection-oriented. This means a connection is established between source and destination machines before any data is sent it implies that a connection is established and maintained until such time as message or messages to be exchanged by application programs at each end have been exchanged. Connections provided by TCP are known as Virtual Connections. It means that there is not any physical direct connection between computers.
TCP is used along with Internet Protocol to send data in form of message units between computers over Internet. While IP takes care of handling actual delivery of the data, TCP takes care of keeping track of individual units of data (known as Packet) that a message is divided into for efficient routing through Internet. TCP provides for a reliable, connection-oriented data transmission channel between two programs. Reliable means that data sent is guaranteed to reach its destination in order sent or an error would be returned to sender.
For instance, when an HTML file is sent to someone from a Web server, Transmission Control Protocol (TCP) program layer in that server divides the file in one or more packets, numbers the packets after that forwards them individually. Though every packet has same destination IP address, it can get routed differently through network. At the other end (client program in our computer), TCP reassembles individual packets and waits till they have arrived to forward them as a single file.
TCP is responsible for making sure that a message is divided into the packets which IP manages and for reassembling packets back into complete message at the other end. In Open Systems Interconnection (OSI) communication model, TCP is in layer 4, Transport Layer.
What do you mean by u-area (user area) or u-block? This having the private data that is manipulated only by the Kernel. This is local to the Process, i.e. every process is a
Q. What is Compact Disk ROM? Both audio CD and CD-ROM (compact disk read-only memory) share similar technology. Main difference is that CD-ROM players are more rugged and have
Some of the file extensions present in MS Access are ? Access blank project template .adn ? Access database .accdb ? Access Workgroup .mdw ? Access project .adp ? A
What is control word? A control word is a word whose individual bits show the various control signals.
Exponential Search Another alternative to variable size decrease-and-conquer search is known as exponential search. This algorithm begins searching at the beginning of the list
Different systems that can participate in grid computing as platform are: Windows 3.1, 95/98, NT, 2000 XP , DOS, OS/2, , supported by Intel ( x86); Mac OS A/UX (Unix) sup
What is a Development class? Related objects from the ABAP/4 repository are assigned to the similar development class. This enables you to right and transport related objects
Why are interrupt masks provided in any processor? Interrupt mask enable the higher priority devices comes first and there for lower priority devices comes last. The interrupt
) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a picto
Explain the numbering plan for ISDN address structure. The numbering plan for ISDN is evolved with using the following guidelines: 1. This is based on, and is an improvemen
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd