Determine maximum value for tcp sequence numbers

Assignment Help Computer Networking
Reference no: EM1372367

Consider transferring an enormous file of L bytes from host A to host B. Assume an MSS (Maximum Segment Size) of 1460 bytes.

a) What is the maximum value of L such that TCP sequence numbers are not exhausted? Recall that the TCP sequence number filed has four bytes.

b) For the L you obtain in (a), find how long it takes to transmit the file. Assume that a total of 66 bytes of transport, network and data-link header are added to each segment before the resulting packet is sent out over a 10 Mbps link. Ignore flow control and congestion control so A can pump out the segments back to back and continuously.

Reference no: EM1372367

Questions Cloud

Create the database using three tables : Create the database using three tables: one for student information, one for advisor information, and one for department information.
How much profit does each firm earn : How much profit does each firm earn. Ignoring antitrust considerations, would it be profitable for your firm to merge with Fasten It If not, explain why not; if so, put together an offer that would permit you to profitably complete merger.
Four examples of social networks : Describe what social networks are. Provide four examples of social networks, which are not in your text. Interpret social networks from the perspective of functional analysis and from the perspective of conflict theory.
What is the velocity of rocket after the fuel has burned : An 82 g arrow is fired from a bow whose string exerts an average force of 95N on the arrow over a distance of 77.00 cm. What is the speed of the arrow as it leaves bow.
Determine maximum value for tcp sequence numbers : Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number filed has four bytes.
Concept of opportunity cost principle : We make choices as customers every day. Opportunity cost is defined as a person's next best alternative' or best of what you give up when you make a choice
What are four firm concentration ratios : Total industry sales are $105 million. Top four firms account for sales of $10 million, 9 million, 8 million and $5 million, respectively. What are four firm concentration ratios.
Determining social issues : In addition to using the course material, you're to go onto the Internet and find information pertaining to your topic which suggests that the issue you've selected is a current concern.
Design and implement a small database application : Perform the conceptual database design using Entity-Relationship model. You must submit the Entity-Relationship diagram of your database and develop queries in the target DBMS

Reviews

Write a Review

Computer Networking Questions & Answers

  Draw potential network architecture of data network

Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the network.

  Explaining bayesian belief networks

A quality control manager has used algorithm C4.5 to come up with rules that classify items based on several input factors. The output has two classes -- Accept and Reject. An item classified as Reject is actually good?

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  Describe quality of service (qos) and explain the motivation

Describe Quality of Service (QoS) and explain the motivation behind QoS Referring to the diagram below, configure Routers 1, 2, and 4 with Internet Protocol (IP) addresses, and ping between them to test connectivity. Write down complete commands..

  Describe osi model-tcp-ip protocol

Define and describe the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

  Explain bgp in wan between different as

You are using BGP-4 in WAN between AS1, AS2, and AS3. Explain in plain text or as BGP-4 policy statement how you would: Allow AS3 to communicate with AS1 but not allow AS2 to communicate with AS1.

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Compute udp checksum for internet department

Suppose that the receiver computes the UDP checksum for the Internet department received UDP and finds that matches the value transferred to the checksum field.

  Create ip network based on requirements

XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Create the IP network based on the requirements

  Locate two disaster recovery services used by small business

Use the Web to locate two disaster recovery services that could be used by a small business such as Dirt Bikes. Compare them in terms of the services they offer.

  Explaining bgpv4 router receives update

Suppose a BGPv4 router receives update for prefix P which indicates AS1 is next hop.

  Make arrangement of subnet masks to form subnets

Organization owns network 200.1.1.0/24 and wants to form subnets for 4 departments. Write a possible arrangement of subnet masks to make this possible.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd