Maximum ethernet payload

Assignment Help Computer Networking
Reference no: EM13705173

Question: Could you please help me to solve this question...

You set up an experiment in which host A blasts a 26 Megabyte file to host B through a single TCP Tahoe connection over a 1 Gigabit/sec Ethernet. B transmits no data. Neither host uses any IP or TCP options.

The maximum Ethernet payload size is 1500 bytes. With no options, the IP+TCP headers occupy exactly 40 bytes. This leaves a TCP maximum segment size (MSS) of 1,460 bytes, about 1/18,000 the size of the file. Which of the following statements are true (check all that apply):

Part 1: Host B can send TCP acknowledgements to host A, even though it has no data to send.

Part 2: The size of the flow control window in segments B sends (the window field) can't increase throughout the duration of the connection.

Part 3: Suppose that the last RTT sample at host A is 10 msec. The current value of the RTT estimate must be greater than or equal to 10 msec.

Part 4: If the user temporarily stops or suspends the process receiving the data on host B, host A will eventually stop sending new data until B's receiver process is resumed.

Describe each and every part in depth with examples.

Reference no: EM13705173

Questions Cloud

What is a structural hazard in operating systems : What is a structural hazard in operating systems?
Prove that the fifth root of 2 is irrational : Use contraposition to prove that if n^5 is even so is n where n is an integer. The contra positive would be if n is odd, then n^5 is odd.
User to enter a positive integer with 2 digits : It asks the user to enter a positive integer with 2 digits - If the entered number is out of range, the message "Too difficult!" is printed and the program terminates.
Write an app to test class integerset : Create class IntegerSet. Each IntegerSet object can hold integers in the range 0-100. The set is represented by an array of bools. Array element
Maximum ethernet payload : Host B can send TCP acknowledgements to host A, even though it has no data to send - experiment in which host A blasts a 26 Megabyte file to host B through a single TCP Tahoe connection over a 1 Gigabit/sec Ethernet. B transmits no data. Neither ho..
Er diagram representing the logical data model : Create an Entity-Relationship Diagram representing the logical data model for the following scenario. It should include all entities, attributes, relationships and keys.
Command to rename all files in your entire system : Write a command to rename all files in your entire system named temp.old to New - Count the number of lines in file F1 that has the word unix
Create an interface that includes a group box : Create an interface that includes a group box that contains 3 check box and 3 text box, the three text boxes should be invisible when the application starts
Who want to place children in the program : The daycare keeps a waiting list of families who want to place children in the program.

Reviews

Write a Review

Computer Networking Questions & Answers

  Find out about desktop virtualisation

Describe your reasoning for choosing the Virtualisation technology and what advantages this technology gives you in this scenario?

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

  Describe the security features available on a platform of

? describe the security features available on a platform of your choice for example linuxandroidmac os

  Under what circumstances would using strict source routing

Source routing (2010) defines strict source routing as specifying "the exact route that the packet must take".Strict source routing is almost never used; under what circumstances would using strict source routing actually be beneficial and why?

  Question - subnettingconsider the following scenarios -a

question - subnettingconsider the following scenarios -a you are an isp that has been assigned a class b network with

  Explain methods of connecting to internet

Briefly explain the following three methods of connecting to Internet: Cable Internet service, digital subscriber line, and dial-up Internet service.

  Long-distance communication in a wan infrastructure

How can cables like UTP and coaxial cable be used for long-distance communication in a WAN infrastructure? Where are these cables used most often?

  If you had an enterprise organization

If you had an enterprise organization of 1000 users, and had to set up an intranet web server, which web server would you use? Please explain your answer. (I just need one good paragraph).

  Athe keyspace for a cipher is the set all of possible keys

athe keyspace for a cipher is the set all of possible keys that can be used for the cipher. a des key consists of 56

  Explain elementary process for case-tracking system

You are now modeling logic of each elementary process for case-tracking system and have decided to write it is Structured English to communicate effectively with both users and programmers.

  Explain how to update star topology

How would you recommend the update to Star topology? What updates you would have about network hardware in order to move to 100BaseT?

  What ip range would an isp provide to a customer

Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.0.0.0/24 a)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd