Byte number - transport layer, Computer Networking

Byte Number

TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stores  them in the sending  buffer and number them. The numbering  does not necessarily start from0. Instead TCP generated a random number between 0 and 232-1 for  the number  of the  first byte  for  example  if the  random numbers  happens to be 1057 and the total  data to be sent are 6000 bytes,  are numbered from 1057 and 7056.

The bytes  of data  being  transferred in each  connection are numbered by TCP. The  numbering starts  with a randomly generated number.

Posted Date: 3/12/2013 11:46:05 PM | Location : United States







Related Discussions:- Byte number - transport layer, Assignment Help, Ask Question on Byte number - transport layer, Get Answer, Expert's Help, Byte number - transport layer Discussions

Write discussion on Byte number - transport layer
Your posts are moderated
Related Questions
Can you describe the broader steps of how L2F establishes the tunnel?

Name the two commands that save the running-config to a TFTP server Ans)  Two commands are:- a) copy running tftp  b) write network

Question 1 A) Explain briefly the advantages wireless communication systems                   B) What is a cellular network? Question 2 Explain fundamental architecture of

In collective message passing, all the processes of a set participate in communication. MPI gives a number of functions to execute the collective message passing. Some of them are

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Determine the working of Communications Intranet Intranets of this type tend to feature in geographically dispersed organisations. The motivation for its implementation is g

Qustions: Simplify the following expression using a Karnaugh map: F = XY‾Z + X‾Y‾Z + XY Z +X‾ Y Z

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

What are the issues there in network environment Some of the issues necessary are: Network planning should be carried out covering the following important issues:

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD