Sequence number - transport layer, Computer Networking

Sequence Number

After  the bytes have been numbered TCP assigns a sequence number to each segment   that is  being sent. These sequence number for each segment  is the number of the  first  byte  carried  in that  segment.

The  value  in the  sequence  number fields of a segment defines the number of the first  data byte  contained in that  segment when a segment carries a combination of data and control  information. It uses a  sequence number. If a segment  does not  carry  user data. It does  not logically define a sequence number. The field  is there but the value  is not  valid. However some  segments  when carrying  only  control information  needs a sequence  number to allow  an acknowledgment form  the receiver. These segments  are used  for connection  establishment. Termination  or  abortion. Each  of these segment  consumes one sequence number  as through it carried i byte but  there are no actual data. If the randomly  generated  sequence number  is x the first  data  byte  is numbered x +1. The  byte  x is  considered a phony byte  that  is used for a control  segment  to a connection.

Posted Date: 3/12/2013 11:42:57 PM | Location : United States







Related Discussions:- Sequence number - transport layer, Assignment Help, Ask Question on Sequence number - transport layer, Get Answer, Expert's Help, Sequence number - transport layer Discussions

Write discussion on Sequence number - transport layer
Your posts are moderated
Related Questions
In the VOIP system, let h be the total number of header bytes added to each chunk, including UDP and IP header. a)  Assuming an IP datagram is emitted every 20 msec, find the tr

Determine the term - Experimental neuropsychology This is an approach which uses methods from experimental psychology to uncover the relationship among the nervous system and c

Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase

Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o


Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

What is Connection-oriented communication Connection-oriented communication can be in three phases. In establishment phase a request is made to set up the connection. Only afte

Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process? a. Discovery b. Offering c. Reques

What is Groupware server? Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server sy

What are the different technologies involved in establishing WAN links? Analog connections - using conventional telephone lines; Digital connections - using digital-grade telep