StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

TCP Has Got Widespread Usage in Computer Networking - Essay Example

Cite this document
Summary
The paper "TCP Has Got Widespread Usage in Computer Networking" states that the static nature of segment retransmission totally undermines the possibility of delay in the network which has resulted in late delivery of the packet which has actually been assumed as a lost packet. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
TCP Has Got Widespread Usage in Computer Networking
Read Text Preview

Extract of sample "TCP Has Got Widespread Usage in Computer Networking"

TCP has got widespread usage in computer networking because of its ability to perceive any congestion in the applied network. It is this ability that has made this protocol intelligent enough to make adjustments in the rate at which it sends data segments. A TCP sender estimates congestion in a network depending on the number of duplicate ACKs. If it receives three duplicate ACKs, it considers the network as congested and loss of that particular segment to which the receiver TCP is sending ACKs. So for the resending of the lost segment, the sender TCP waits for a total of four ACKs from the receiver. But this presumption of congestion by the sender TCP while using the constant threshold technique is not an impeccable procedure and may cause several problems.    2. Give a rough explanation of the proposed solution. The solution proposed by this paper provides a set of modifications at the sender level applying Non-congestion Robustness (NCR) to TCP. The ACK-based system is modified to selective ACK i.e., SACK. This SACK-based segment recovery technique while getting out of the in-order segment transmission strategy, will inform the sender about all segments that have been received and hence the sender will have to retransmit only those segments which have been lost. The TCP-NCR withdraws the TCP from the ACKs-based retransmission technique to the congestion window (cwnd) of data that has left the network. The threshold value, in this case, is very much a dynamic entity with an appropriate choice for the same is a matter of smart decision-making related to the reasons behind duplicate ACKs and responsiveness. The retransmission is triggered after the TCP sender is aware of the fact that the cwnd’s worth of data has left the network.   3. Explain at least one advantage and one disadvantage of the enhancement that is specified in this RFC.  The TCP-NCR technique will result in better TCP performance. With the SACK-based approach, the algorithm despite being a bit complex achieves better performance with less complicated modifications. The modifications result in better packet reordering procedures instead of stressing on ACKs-based segment retransmission technique thereby preventing the TCP from reducing the sending rate due to needless retransmission.    The TCP-NCR has its set of drawbacks. Though it is believed to make changes on the sender side but in reality receivers’ buffering requirement has to be increased up to an extra cwnd. The RTT factor will lead to the introduction of a delay in fast retransmission. The delivery of data to the application could be delayed by at least one RTT. This will virtually make the TCP-NCR useless for those applications which are sensitive to delays of duration nearing RTT.   Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Congestion control Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Congestion control Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/technology/1512838-congestion-control
(Congestion Control Essay Example | Topics and Well Written Essays - 500 Words)
Congestion Control Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/technology/1512838-congestion-control.
“Congestion Control Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/technology/1512838-congestion-control.
  • Cited: 0 times

CHECK THESE SAMPLES OF TCP Has Got Widespread Usage in Computer Networking

Basic Network Technology, Structure, and Protocols

BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Author Author Affiliation Date networking is the way of linking two or more computer systems, devices or even networks jointly with the intention of distributing and sharing useful information and data.... There are diverse kinds of networking, for example there are WANs (wide area networks) or LANs (local area networks).... Additionally, networks are created using a combination of computer software and hardware....
3 Pages (750 words) Research Paper

Strengths and Weaknesses of Wireless Networking

These days the trend of wireless networking is emerging quickly.... This paper presents a detailed analysis of wireless networking technology.... This research will outline advantages and disadvantages of wireless networking.... computer is a wonderful machine which is used in every field of life to perform different kind of tasks.... computer is a wonderful machine which is used in every field of life to perform different kind of tasks....
11 Pages (2750 words) Essay

Advancements in the humanities:Internet

In the past, computer messaging was unreliable, there was no infrastructure to send and receive high-speed electronic texts and people were struggling to invent digital networking.... Events that Led to the Advancement The early internet was mostly used by engineers, scientists, librarians and computer experts and was unfriendly to other users.... A result of visionary thinking in early 1960s to allow computers share data on research,the internet has growingly made its presence felt....
6 Pages (1500 words) Essay

To IP and Beyond

In this scenario, the basic purpose of this development was to provide a way for information distribution and communication in which a computer is able to set up an instant link to a server prior to additional communication takes place.... However, if a computer does not establish a connection to a server, a server will pay no attention to that computer's request (The TCP/IP Guide, 2005; Polenin, 2012; Gilbert, 1995).... In fact, a number of different systems located in a small building or office can employ tcp/IP (in conjunction with additional protocols) on a single local area network (LAN)....
9 Pages (2250 words) Literature review

Networking Funamentals

In networking Fundamentals, Local Area Network (LAN) may require equilibrium among LAN theory and LAN apply.... So it is critical that a networking route hit equilibrium among standard and lab carry out.... This approach gives organizations equally a fine thoughtful of the LAN protocols and the exploit of LAN in today's data networking.... This propensity also shows in data communication and networking projects in general, for instance....
14 Pages (3500 words) Essay

How ISPs Can Help Fight Botnets and Cybe

The bot is defined as malicious software that may be residing on a single computer.... It is automated and runs by the command from the IRC server, it makes the computer compromised and a part of a wider network of similar infected systems.... The invention of the internet has aggravated these threats and has given new means for malicious activities.... IRC is a protocol that has been developed for real-time many-to-many communication....
14 Pages (3500 words) Essay

Designing Human Interfaces for Operating Systems

n operating system is a software program, which facilitates the management of 'hardware and software resources of a computer' and performs tasks including 'controlling and allocating memory, prioritizing the processing of instructions, controlling input and output devices, facilitating networking, and managing files' etc (Mamčenko, n.... User interfaces and operating systems are important parts of a computer system that basically define their usage for different types of users....
9 Pages (2250 words) Essay

Next Generation Mobile Computing

computer terminals that are portable have been used in different business domains over the past 20 years in either disconnected or connected fashion (Kato, 2012).... The description above can be widened to comprise of other types of devices like PDAs, mobile phones as well as tablet technology together with other usage situations, with the definition further encapsulating the more traditionally commercial aspects of mobile computing.... hen it comes to the connected world, utilization of remote access terminals has been employed in such aspects as the delivery of the package, terminals for dispatching taxis as well as those of remote police cars....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us