Modifying the system’s TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _______.

A. poison packet B. slashdot

C. backscatter traffic D. random drop

D. random drop

Computer Science & Information Technology

You might also like to view...

What is the following kind of statement called?

int counter;

Computer Science & Information Technology

What are the basic differences between the fitness-based model [ 3] and the varying intrinsic fitness-based model [ 4]? Distinguish these two models in the light of analytical determination of scaling exponents. Compare the above evolution models with the preferential attachment– based model.

Computer Science & Information Technology