TAILIEUCHUNG - Practical TCP/IP and Ethernet Networking- P58

Practical TCP/IP and Ethernet Networking- P58: The transmitter encodes the information into a suitable form to be transmitted over the communications channel. The communications channel moves this signal as electromagnetic energy from the source to one or more destination receivers. The channel may convert this energy from one form to another, such as electrical to optical signals, whilst maintaining the integrity of the information so the recipient can understand the message sent by the transmitter | Satellites and TCP IP 267 immediately send a replacement packet thus avoiding the timeout condition and the consequent lengthy recovery in TCP which would otherwise then have reduced its window size and then very slowly increased bandwidth utilization Congestion avoidance There are two congestion avoidance techniques but neither has been popular as yet. The first approach which has to be implemented in a router is called random early detection RED where the router sends an explicit notice of congestion using the ICMP protocol discussed in an earlier chapter when it believes that congestion will occur shortly if it doesn t take corrective action. On the other hand an algorithm can be implemented in the sender where it observes the minimum round trip time for the packets it is transmitting to calculate the amount of data queued in the communications channel. If the number of packets being queued is increasing it can reduce the congestion window. It will then increase the congestion window when it sees the number of queued packets decreasing. TCP for transactions T TCP As discussed earlier the three-way handshake represents a considerable overhead for small data transactions often associated with HTTP transfers . An extension called T TCP bypasses the three-way handshake and the slow-start procedure by using the data stored in a cache from previous transactions. Middleware It is also possible to effect significant improvements to the operation of TCP IP without actually modifying the TCP IP protocol itself using what is called middleware where split-TCP and TCP spoofing could be used. Split-TCP The end-to-end TCP connection is broken into two or three segments. This is indicated in the figure below. Each segment is in itself a complete TCP link. This means that the outer two links which have minimal latency can be setup as per usual. However the middle TCP satellite link with significant latency would have extensions to TCP such as TCP-LW and T TCP. This means only .

TÀI LIỆU MỚI ĐĂNG
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.