Question

In: Computer Science

TCP congestion control was primarily designed for elastic applications like web-browsing or email, which are delay...

TCP congestion control was primarily designed for elastic applications like web-browsing or email, which are delay agnostic. At steady state, TCP congestion window wildly fluctuates to resemble a “saw tooth” pattern. Given that streaming media is the dominant traffic on the Internet today, how should the congestion window behave to better cater to video? Streaming media is not elastic: it is very sensitive to delay fluctuations.

Solutions

Expert Solution

Please upvote if you are able to understand this and if there is any query do mention it in the comment section.

For serving multimedia in good quality, multipath transmission is required. Multipath transmission increases the rate of transmission and packet loss can also be avoided. In this the congestion window of the TCP also plays a role. What happens is that the status of the network is monitored and the subflow which was a reason for the packet loss is adjusted accordingly. The congestion window of every subflow of TCP is adjusted as per the Round Trip Time(RTT). In case if there is a packet loss while streaming media then TCP will increase the size of the congestion window linearly. This might take certain time due to which multipath is used which can reduce the variation in the rate of transmission.

So the congestion window is increased so that it reaches to the maximum and using multipath it takes lesser time to reach the maximum size as the packet loss rate is reduced.

If this was supposed to be done in any other way or there is still any query then please mention it in the comment section otherwise please upvote.


Related Solutions

TCP congestion control the congestion window is typically resized at the event receiving a) Timeout and...
TCP congestion control the congestion window is typically resized at the event receiving a) Timeout and 3 duplicate acknowledgment? **Please Explain the solution when you answer my questions because I don't know how to solve it :(
Draw a diagram using the congestion control mechanism of TCP Reno and Tahoe. Don’t copy the...
Draw a diagram using the congestion control mechanism of TCP Reno and Tahoe. Don’t copy the diagram from lecture slides or the Internet. You have to use your own data for this diagram. The diagram should be very clear and properly labelled.
Draw a diagram using the congestion control mechanism of TCP Reno and Tahoe. Don’t copy the...
Draw a diagram using the congestion control mechanism of TCP Reno and Tahoe. Don’t copy the diagram from lecture slides or the Internet. You have to use your own data for this diagram. The diagram should be very clear and properly labelled.
Question 4 Draw a diagram using the congestion control mechanism of TCP Reno and Tahoe. Don’t...
Question 4 Draw a diagram using the congestion control mechanism of TCP Reno and Tahoe. Don’t copy the diagram from lecture slides or the Internet. You have to use your own data for this diagram. The diagram should be very clear and properly labelled. Question 5 What is the ideal window size for the working of selective repeat? Explain with an example.
Which control activity is designed to make fraud less likely
Collusion is an intentional act of two or more employees to accomplish theft of company assets. Which control activity is designed to make fraud less likely because it would require collusion among employees? A. Adequate documents and records  B. Clearly defined authority and responsibility  C. Safeguards over assets and records  D. Segregation of duties
Which of the following accurately describes internal control? (Several choices may be correct.) Process designed and...
Which of the following accurately describes internal control? (Several choices may be correct.) Process designed and implemented by those charged with governance and the management of the company. Process maintained and improved by external auditors. Objective is to provide reasonable assurance the company is achieving its objectives. Objective is to provide an absolute assurance the company is providing accurate financial reporting. External auditors are required to gain an understanding of the process
How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?
How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?  
Which is least appropriate type of transaction for a real-time system. a. airline reservations. b. payroll. c. point-of-sale transactions. d. air traffic control systems. e. all of these applications typically utilize real time processing.
Which is least appropriate type of transaction for a real-time system. a. airline reservations.b. payroll.c. point-of-sale transactions.d. air traffic control systems.e. all of these applications typically utilize real time processing.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT