What are the techniques a transport protocol uses?

What will be an ideal response?


A transport protocol uses various techniques, such as:
? Uses parity bits, a checksum, or a cyclic redundancy check (CRC) for tackling transmission
errors
? Uses sequencing to handle duplicates and out-of-order delivery
? Uses retransmission to handle lost packets
? Uses some techniques to avoid replay
? Uses flow control to prevent data overrun
? Uses techniques to avoid congestion

Computer Science & Information Technology

You might also like to view...

What output is sent to the file out.dat by the following code, assuming these lines of code are embedded in a correct program?

What will be an ideal response? ``` ofstream fout; fout.open("out.dat"); fout << "*" << setw(5) << 123 << "*" << 123 << "*" << endl; fout.setf(ios::showpos); fout << "*" << setw(5) <<; 123 << "*" << 123 << "*" << endl; fout.unsetf(ios::showpos): fout.setf(ios::left); fout << "*" << setw(5) << 123 << "*" << setw(5) << 123 << "*" << endl; ```

Computer Science & Information Technology

To add new pages to a document after it has been created, click the Pages Panel menu button, click Add Pages to open the Insert Pages dialog box, and then choose how many pages you would like to insert and their locations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Publisher contains hundreds of predesigned layouts called templates that you can use as the basis for professional-looking projects.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You cannot preview the data to be deleted in a delete query before actually performing the deletion.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology