answersLogoWhite

0


Best Answer

The part of the message that is missing is retransmitted.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What happens when part of a message using tcp is not delivered to the destination host?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is message switching?

Message switching is a telecommunications data transfer method that was first introduced in 1961; unlike packet switching that came after, message switching sends the entire message as one unit. To transfer the message, the message is first stored and then transferred via hops until it reaches the destination. Most messages are too large for random access memory (RAM), so the messages are temporarily stored in the hard drive. While message switching is not the primary method for data transfer, because it is slower and experiences delays when sending, it is still used widely with sending email. The advantages of this method are lowerbandwidth costs, better management of network congestion, and the easy transfer of messages to different destinations. When a user sends a message using message switching, this method first saves the entiremessage and then designates an address for the message, so it knows where the message is going. Once saved, the message is sent to the router, which switches it to the first hop, or node. At each hop, the message is inspected for problems or errors before being sent on to the next hop. The message keeps hopping around until it reaches its final destination. by muhammad kamran from bannu university number=03369797939


What is a secure encryption?

Encryption is a process of translating a message from the Plaintext, into an encoded message, called the Ciphertext. This is usually accomplished using a secret Encryption Key and a cryptographic Cipher. ss of translating a message, called the Plaintext, into an encoded message, called the Ciphertext. This is usually accomplished using a secret Encryption Key and a cryptographic Cipher.


How do you communicate an idea using a network?

write and send a text message.


What are true statements about routes and their use?

--> If the destination network is directly connected, the router forwards the packet to the destination host. --> If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router. --> If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.


How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works. An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages. Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to. To get more details on the mathematics of encryption and decrption using Public Key Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

Related questions

What are the protocols that send and deliver mail?

An email message is created using a mail client program. This program then sends the message to a server. The server then forwards the message to the recipient's email server, where the message is then supplied to the recipient's email client. It's delivered using a server architectureBy L.S.


What happens if you send a text message to you home phone?

Most networks will reject the attempt, since the receiving phone is not capable of processing text messages.However there are some (British Telecom is one example) that will deliver a text message as a phone call using text to speech technology. The message is delivered verbally, sometimes with amusing and bizarre results.


What are the advantages of using a fax message?

A fax is generally considered to be faster to send than a courier or mail message. Compared with email, it provides a "proof of receipt" that the message was delivered in the form of a confirmation page.


What does destination blocked mean when you try to send a text message?

Destination blocked is a message one can receive when attempting to reach a number that is blocked from the phone you are using. This often appears on phones where premium texting, or texts that attach an additional charge to your phone bill, are blocked and one attempts to text a premium service.


How did ancient Egyptians communicate using the Nile river?

I think Egyptians used a man payed to travel down the river walk to the destination and give the message


What is the main purpose of the protocol SMTP?

SMTP:-SMTP, Abbreviated from of simple mail Transfer Protocol.Is an internet standard used to transfer email messages between two server across Internet Protocols networks.A majority of email system use SMTP to send email messages.SMPT is "PUSH" Protocol and so, it can't "PULL" the email message from a remote server.Functions:-SMPT Perform two important function to enable the clients to send email message to any other exiting email address.SMTP verifies whether the person using SMPT server to send email message has the right to do so.SMTP delivers the message to the specified destination and checks whether the messages are delivered successfully. If the message aren't delivered successfully, SMPT notifies, the sender through an error message and sends the undelivered message back to the sender.


How is water delivered?

Water is delivered by using large metal pipes.


Can the sender using slang interfere with the understanding of the message by the receiver?

Yes, this is true. Messages not delivered in person, should avoid slang unless you know for certain that the recipient uses the same slang as you do.


What does tweet mean in computer trems?

It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.It means to send a message using Twitter. See the link below.


How does USPS package tracking work?

When one chooses to ship with USPS, a tracking number will be provided for the shipment. The shipper can then track the package as it makes its way to its destination using the online USPS tracking tool and the number provided to track the package. One can even view a signature if one was given, and confirm that a package was delivered very quickly after it reaches its destination.


How does a text message get sent from one phone to another?

When we start typing a message it is stored temporily in our phone memory... when we give "send" it is sent to the cell phone tower using CONTROL CHANNEL(which is used for communication) and the device there will send the msg to the reciever(say ur frnd's) tower and from there the msg is delivered to the recipient.


How do you convert voice message to text message using electronics circuits?

It is only possible by using voice-to-text software, you cannot do it using electronic circuits.