Maximum size of file-tcp sequence numbers are not exhausted

Assignment Help Computer Networking
Reference no: EM1355804

Q1) Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes.

a. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

b. For the L you obtained in (a),calculate how long it takes to transmit the file over a 10 Mbps link if to each segment a UDP header and, 46 bytes of network and link layer header information is added.

c. For the L you obtained in (a), calculate how long it takes to transmit the file over a 10 Mbps link if to each segment a TCP header (with no options) and, 46 bytes of network and link layer header information is added. Ignore flow control and congestion control.

Reference no: EM1355804

Questions Cloud

Determine the per unit contribution : The firm's total fixed cost are $80,000, there are no beginning or ending inventories, Determine the per unit contribution for each of the two models.
Calculate the radius of the path of the ion in the field : A 2000 kg car traveling at a speed of 23m/s skids to the halt on wet concrete where = 0.60. How long are the skid marks.
Dedication and commitment to the cause : How would you increase their dedication and commitment to this cause? How would you inspire them to continue to be involved in projects such as these?
Adjustable rate mortgages and rate on fixed rate mortgages : How does the initial rate on adjustable-rate mortgages different from the rate on fixed-rate mortgages? Explain your reasoning.
Maximum size of file-tcp sequence numbers are not exhausted : Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?
Provision of counseling services to children : Based on your experience in the field of counseling or other professional arena, Can you identify and discuss three specific legal issues that are associated with the provision of counseling services to children and adolescents.
Find the total power radiated : A 13g bullet traveling 221 m/s penetrates a 2 kg block of wood and emerges cleanly at 160 m/s. If the block is stationary on a frictionless surface when hit, how fast does it move after the bullet emerges.
Journal entries write off accounts receivable : Prepare the journal entry for Sorter Company to write off the Ordonez receivable. When writing the journal entry use Dr. for debit and Cr. for credit.
Receipt of dividends affect the investment account : Bista Company announces and distributes a cash dividend that is a result of current earnings. How will the receipt of those dividends affect the investment account of the investor under each of the following accounting methods?

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Represent the encryption of plaintext with key using des

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Prove that y' = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented).

  Explain private ip addressing used in conjunction with nat

Explain if private IP addressing should be used in conjunction with NAT (Network Address Translation)? Describe what IP class you would consider using.

  Acknowledge technoogy-s polypotency

Richard Sclove argues that we must do more to acknowledge technoogy's 'polypotency.' What does this term mean, why does Sclove think that it is significant to acknowledge this characteristic of technology?

  Explaining users a cell can support blocking rate

Find out how many users a cell can support for a 5% call---blocking rate. Assume that each user produces 35mE of load in the busy hour.

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

  Explaining reconnaissance tools

Write down some popular reconnaissance tools?

  Explaining labels in dns domain names

From RFC 1034, DNS domain names are composed of labels. Are there any labels which nodes are not allowed to allot to their data? If so, what are they?

  Intercepting the message in conversation

Provided that Alice and Bob both suppose that they have the correct public keys for the other party, and supposing that Eve may intercept any messages passed between Alice and Bob, Describe the steps Alice could take in order to ensure that the pub..

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Researching web browsers

Research three web browsers. For each browser, try to use it to at least access, if not actively work with, each of the following type of common web sites.

  Adding four servers to network to share file

Manager would like to add four servers to network so employees can share files. Manager would also like to permit VPN access for her employees so they can work remotely.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd