1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
8

What is the difference between congestion control and flow control? Where are each managed in TCP?

Computers and Technology
1 answer:
solniwko [45]3 years ago
4 0

Answer: The differences between the flow control and congestion control are as follows:-

  • Flow control's traffic is controlled in the direction from sender to receiver whereas traffic control in congestion control be handles from the entrance of the network.
  • Sender is reason for the traffic in flow control while transport layer creates the traffic in congestion control.
  • Transport layer and data link layer are used for managing the traffic whereas congestion control has transport and network layer for handling the traffic.

The TCP for the congestion control works as elimination of the congestion in the sender's field in network layer and transport layer.Flow control is used in TCP to make surety about the non-overwhelming nature of sender towards receiver in the transport layer and data link layer.

You might be interested in
What were the first microblogs known as
Greeley [361]
The first micro blogs was once known a tumblogs
6 0
3 years ago
Read 2 more answers
________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
Alina [70]

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

7 0
2 years ago
Before creating a brief to design a product, what is needed
castortr0y [4]

Answer:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

Explanation:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

8 0
3 years ago
What kinds of online behaviors could be considered cyberbullying?
morpeh [17]

Answer:

anxiety, fear, depression, and low self-esteem. or flaming it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.

Explanation:

5 0
3 years ago
Read 2 more answers
Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
storchak [24]

Answer:

Physical and data link layer.

Explanation:

The ethernet cable is used at the physical layer. The physical layer consists of hardware components. This layer is responsible for transmission of data bits between two nodes via a physical wire. The data link layer provides the means in which data packets are transmitted from one node to another.

Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the packets would be sent from computer A to computer B if computer B is free if not it would wait until computer B is not transmitting before it can start sending data packets to computer B.  

5 0
3 years ago
Other questions:
  • Playville is a tiny town in fictional middle earth, which is inhabited by dwarves and elves. Playville has a playground to which
    6·1 answer
  • Who usually signs a collection letter?
    15·2 answers
  • Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find t
    7·1 answer
  • To find temporary windows files begin by typing in the search box
    6·1 answer
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    8·1 answer
  • Que es el sistema persona producto?​
    8·1 answer
  • A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method
    8·1 answer
  • What kind of AR target category makes sense for a playing card with a picture on it?
    12·1 answer
  • What do you mean by computer ethics?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!