Following is the answer:
Transmission Control Protocol (TCP) uses a sliding window for flow control.
Flow control is controlled by the receiving side.
It ensures that the sender only sends what the receiver can
handle.
Think of a situation where someone with a fast fiber connection
might be sending to someone on dialup or something similar.
The sender would have the ability to send packets very quickly, but
that would be useless to the receiver on dialup, so they would need
a way to throttle what the sending side can send.
Flow control deals with the mechanisms available to ensure that
this communication goes smoothly.
How its Work:
When we need to send data over a network, this is normally what
happens.
The sender application writes data to a socket, the transport layer
(in our case, TCP) will wrap this data in a segment and hand it to
the network layer (e.g. IP), that will somehow route this packet to
the receiving node.
On the other side of this communication, the network layer will
deliver this piece of data to TCP, that will make it available to
the receiver application as an exact copy of the data sent, meaning
if will not deliver packets out of order, and will wait for a
retransmission in case it notices a gap in the byte stream.
TCP stores the data it needs to send in the send buffer, and the data it receives in the receive buffer. When the application is ready, it will then read data from the receive buffer.
Flow Control is all about making sure we don’t send more packets when the receive buffer is already full, as the receiver wouldn’t be able to handle them and would need to drop these packets.
To control the amount of data that TCP can send, the receiver will advertise its Receive Window (rwnd), that is, the spare room in the receive buffer.
Every time TCP receives a packet, it needs to send an ack message to the sender, acknowledging it received that packet correctly, and with this ack message it sends the value of the current receive window, so the sender knows if it can keep sending data.
*** Please be coherent and concise. Thank you ! *** 1. TCP Congestion Control (20 points). Suppose host A sends a large file to host B using a TCP connection. Suppose this TCP con- nection only uses AIMD without slow start. Furthermore, the initial value of cwnd is 1 MSS. Assume cwnd increases by 1 MSS every time a batch of ACKs is received by host A. Also assume almost constant round-trip time, denoted as RTT. a. (10 points) How...
1. For TCP end-to-end flow control, suppose the capacity of the receiver buffer is 10 packets. Suppose the packets that are being queued in the receiver buffer are packets 4, 5, 6, 7, 8, 10, 11. What is the advertised window size the receiver sent to the sender? Suppose packet 12 is the last packet sent by the sender. What’s the effective window size at the sender? Can the sender send out packet 13 at this moment? How about packet...
How many bits are reserved for the Transmission Control Protocol (TCP) flags?
7. Question A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state? SYN_SENT ESTABLISHED SYN_RECEIVED LISTEN8. Question Which field in a Transmission Control Protocol (TCP) header provides the next expected segment? Sequence number Data offset Checksum Acknowledgement number9. Question Which field in a Transmission Control Protocol (TCP) header is not typically used in modern networking? Acknowledgement number Urgent pointer Sequence number Checksum11. Question In what order will the Transmission Control Protocol (TCP) generally send all segments? Largest to smallest Prioritized Random Sequential12. Question...
3.) (a) How is a TCP connection established? (b) What functions are performed by TCP? (c) How does congestion control affect message delay? (d) TCP is used at the Network Layer- True or False?
Explain how internal control work done by auditors impacts the audit risk equation. Does control risk change if the auditors are providing an opinion over internal controls? How is detection risk impacted?
Explain how internal control work done by auditors impacts the audit risk equation. Does control risk change if the auditors are providing an opinion over internal controls? How is detection risk impacted?
4. Using the stock & flow model of housing as a tool, explain how rent control can limit affordable housing in a jurisdiction
Describe how to use applications and communication protocols in the Transmission Control Protocol/ Internet Protocol (TCP/ IP) suite to design IP addressing and subnetting solutions for variable length subnet masks in your small home network.
(TCO 3) TCP uses __________________ as a congestion-control mechanism. a.stop and wait b.self-clocking c.time-out doubling d.a and c only (TCO 3) Consider transferring an enormous file that uses all of the sequence numbers available from Host A to Host B. Use a MSS of 1,400 Bytes with 100 Bytes of header in each datagram. The link is 100 Mbps. With continuous transmission and ignoring flow control and congestion control, how long does it take to send the data? none of...