answersLogoWhite

0

Buffering and windowing

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What is control flow?

Flow control is used in data communications. Flow control is a process that manages the rate at which data is transmitted to ensure that it is properly received.


What technologies are used to control data flow on the system bus?

active bus


What is conjection control?

Congestion control refers to techniques used in computer networks to manage the flow of data traffic in order to prevent network congestion. It helps to ensure that the network operates efficiently by regulating the rate at which data is transmitted and making adjustments as needed to avoid overwhelming network resources.


Why is data protocol used?

data protocol is used to route the data from the source to destination, and it is also used for congestion control, flow control & error control in the data that is being transmitted........... data protocol is responsible for the end to end delivery of the data, which may be in the form of messages, frames, packets across the different layers of the protocol architecture....


How are locking techniques used for concurrency control?

Concurrency means use of database by many users at the same time.Concurrency control techniques (Different techniques) are used control multiple transactions interfere each other to produce wrong results. therefore one of the main techniques used to control concurrent execution of transaction is based on the concept of locking of data item. A lock is a variable associated with a data item in the database and describes the status of that item with respect to possible operation that can be applied to that item. Generally there is a one lock for each data item in the database.


Why is data useful?

data protocol is used to route the data from the source to destination, and it is also used for congestion control, flow control & error control in the data that is being transmitted........... data protocol is responsible for the end to end delivery of the data, which may be in the form of messages, frames, packets across the different layers of the protocol architecture....


Techniques of strategic control?

Different techniques


How many techniques used to discard data?

Three type of techniques used


What are the tools and techniques used by RBI for monetary control?

techniques of monetary control of rbi


What are the Techniques used for control of labor cost?

how cost planning techniques are used to control the costs of a construction project


Techniques used to summarize organize and present data that have been collected are called?

Data Gathering and Representation Techniques


What kind of address scheme is used at data link layer?

Data link layer transforms the physical layer and makes it appear error free. Data link layer is responsible for physical addressing. It has some other functions like error control, flow control and access control.