Show the congestion control in TCP, Computer Networking

Assignment Help:

Q. Show the Congestion control in TCP?

Congestion control in TCP

  • TCP assumes that the cause of lost segment is due to congestion in the network
  • Retransmission of the lost packets doesn't solve congestion problem - it aggravates it
  • In flow control, sender window size determined by the receiver window - no information about the network congestion
  • If the network cannot deliver data to the receiver due to congestion, it has to inform the sender to slow down
  • Congestion window: min (receiver window size and congestion window size)

 


Related Discussions:- Show the congestion control in TCP

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Authentication in ppp - point to point , Authentication in PPP PPP can ...

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

Packet switches, PACKET SWITCHES:  To span large distances or several ...

PACKET SWITCHES:  To span large distances or several computers, networks must removed shared phase with packet switches. Each switch moves whole packet from one connection to

Error detection and correction, Error detection and correction The digi...

Error detection and correction The digital traffic stream of second generation systems also lends itself to the use of error detection and correction methods. The result can be

What is the purpose of configuration files for servers, Question 1: a) ...

Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.

What is the difference between trigger and rule, What is the difference bet...

What is the difference between trigger and rule? The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by client

Why do we require a subnet mask? , If the host has the subnet ID why do we ...

If the host has the subnet ID why do we require a subnet mask?

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Describe peer-to-peer networking, You are requested to design a secure home...

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd