Draw a diagram showing the sliding window and pointer

Assignment Help Computer Networking
Reference no: EM13336707

The source on a TCP connection has sent 100 bytes and is using a window size of 400. The source has received no acknowledgments for receipt of bytes.

a. Draw a diagram showing the sliding window and pointer at the source. 

b. Draw a diagram showing the sliding window and pointer at the source after the source sends a further 2 sets of 100 bytes. 

c. After b. the source receives acknowledgment of receipt of byte 300 and an announcement of a new window size of 300 bytes. Draw a diagram showing the sliding window and pointer at the source. 

An example of the layout required (the grey section represents the sliding window):









0-100

101-200

201-300

301-400

401-500

501-600

601-700

701-800




?Pointer





 

Reference no: EM13336707

Questions Cloud

What is the full address of the abbreviated ipv6 : Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.
Determine the speeds of the two masses : Two masses of 27 kg and 18 kg are suspended by a pulley that has a radius of 12 cm and a mass of 9 kg, Determine the speeds of the two masses as they pass each other
Will it travel through any routers : A host with IP address 122.34.23.11 sends a message to a host with IP address 136.34.23.11. Does the message travel through any routers? Explain why. (Assume no sub-netting)
Is either statement true for a pipe of square cross section : Consider a hollow circular cylinder. Use Gauss's law to show that the field inside the pipe is zero. Also show that the field outside is the same as if the charge were all on the axis.
Draw a diagram showing the sliding window and pointer : After b. the source receives acknowledgment of receipt of byte 300 and an announcement of a new window size of 300 bytes. Draw a diagram showing the sliding window and pointer at the source.
Explain the average adult with the lung capacity : How many moles of gas(air) are in the lungs of the average adult with the lung capacity of 3.8 L. Assume the person is at 1.00 atm pressure and has a normal body temperature of 37 degrees celsius.
Why you think dynamically assigning ip addresses are useful : Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet? Explain your answer. c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain..
Explain the ozonolysis of 1,4-dimethylcyclohexene : What product do you get from the ozonolysis of 1,4-dimethylcyclohexene in the presence of Zn
What is the angle of the pendulum : Assuming that vertical = 0 degrees, the angle of the pendulum oscillates between the maximum amplitudes: -theta max and theta max. What is the angle of the pendulum at which the gravitational potential energy is minimum

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe cdma used in gps-qualcomm satellite phone network

Describe CDMA (code division multiple access), that is used in GPS and Qualcomm satellite phone network, also other communication standards.

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

  Sketching lan with operation over a distance

You have been asked to sketch a LAN with operation over a distance of about 100m.

  Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

  Evaluate network performance of different protocols

Should include term project title, motivations, goals, scope of the project, expected outcomes, and computing and network environments.

  Processor execute between receipt of message

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Describe three components found in a web system

Describe one type of variable or method that can be used to exchange data between web pages.

  Describe what is meant by cybersecurity design

Describe what is meant by Cybersecurity Design.List and describe the principles that must be supported.

  Computing depreciation using three-year macrs rates

Depreciation will be calculated using the 3-year MACRS rates of 33%, 45%, 15%, and 7% for the first through the fourth year, respectively. Looner Industries' marginal tax rate is 40%, and its cost of capital is 10%. Should the plant be built?

  What is ntp and what are clock strata

Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the  ash drive containing the encrypted le system. Also explain how she would use the lesystem in her day-to-day ..

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd