What is the protocol overhead

Assignment Help Basic Computer Science
Reference no: EM131038893

A station running TCP/IP needs to transfer a file to a host. The file contains 2,048 bytes. How many bytes, including all of the TCP/IP overhead, would be sent, assuming a payload size of 512 bytes and that both systems are running IPv4? (Also assume that the three-way handshake and window size negotiation have been completed and that no errors occur during transmission.)

a) What is the protocol overhead (stated as a percentage)?

b) Perform the same calculation, this time assuming that both clients are using IPv6.

Hosts A and B are communicating over a TCP connection, and Host B has already received from Host A all bytes up through (and including) byte 248.  Suppose Host A then sends two back-to-back segments to Host B.  The first and second segments contain 40 and 60 bytes of data, respectively.  In the first segment, the sequence number is 249, the source port number is 503, and the destination port number is 80.  Host B sends an acknowledgment (ACK) whenever it receives a segment from Host A.

  • In the second segment sent from Host A to Host B, what are the sequence number, source port number, and destination port number?
  • Assume that the first segment arrives before the second segment.  In the acknowledgement of the first arriving segment, what are the acknowledgement sequence number, the source port number, and the destination port number?
  • Assume that the second segment arrives before the first segment.  In the acknowledgement of the first arriving segment what is the acknowledgement sequence number?

Reference no: EM131038893

Questions Cloud

Why would a lessor provide direct-financing to a lessee : What are the advantages and disadvantages of leasing versus buying or leasing versus selling?
Following information compute the collection : From the following information, compute the collection from Debtors for the month of June, July and August:
What are the criteria for recording contingencies : Why is it important to classify a portion of long-term debt on a yearly basis as a current liability?
Explain in your own words how the stai is scored : A student score 35 on the Trait and 55 on State subscale of the STAI. Interpret these scores with reference to your answer to Q3 above. What does the difference between State and Trait scores mean?
What is the protocol overhead : a) What is the protocol overhead (stated as a percentage)? b) Perform the same calculation, this time assuming that both clients are using IPv6.
Why is there more than one method of depreciation : How and why would you account for the impairment of intangible assets?
Led to the growth of the cotton kingdom : You can ONLY use class materials - lecture notes, writing responses, and assigned books. You can use single or double spacing. Please use 12 point font. If you use doublespacing your exam should not exceed 3 pages. Ultimately, do not worry about t..
Reasoning why you chose these three countrie : Assignment: Imagine a product or service that you want to sell internationally. Tell me what it is and list three countries where you want to start your efforts. Give me the reasoning why you chose these three countries. Total length 40-80 lines i..
Determining the mastery of the material : Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assign..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is a uml diagram?

What is a UML diagram? What does it include? Why is it used? What would the UML diagram look like for our lab assignment? This is for computer programming

  Explain the three major interrelated tasks for creating 3-d

Describe the difference between key frame animation and inverse kinematics

  Communication links on the telephone network

The time delay of a long-distance call can be determined by multiplying a small fixed constant by the number of communication links on the telephone network between the caller and callee. Suppose the telephone network of a company named RT&T is a fre..

  Draw a pda for the language

Draw a PDA for the language L over {0,1} consisting of strings with an equal number of 0's and 1's. So 010011 would be in this language. Next draw a DFA recognizing 0?1?. Use the algorithm from class to draw a PDA for the intersection of these two..

  Computer science question html website development

Design a preliminary homepage called "cssprelimI.htm". It should be similar in layout to the example below, but you may use your own content.

  How to stop process-freeze its memory image in process

Some multicomputers permit running processes to be migrated from one node to another. Is it adequate to stop process, freeze its memory image, and just ship that off to different node?

  General-purpose tree-drawing program

Write a general-purpose tree-drawing program that will convert a tree into the following graph-assembler instructions:

  A transformer has 20 primary windings 100

A transformer has 20 primary windings 100 secondary windings. If the secondary volatage is 25 V, find the primary voltage

  Prove by contradiction that if n is a perfect square

Let n > 1 be an integer. Prove by contradiction that if n is a perfect square, then n + 3 cannot be a perfect square.

  Explain jsp application design using a mvc architecture

Give the format of the HTTP request explain all HTTP request header. Explain JSP application design using a MVC architecture. Write jsp code to insert, delete, select data in ms access table using JDBC table name:item item no, itemname, quantity.

  Discusses network design element

Write a 1-page summary that discusses network design elements such as Cloud and Virtualization that can be security risks and how they can be applied to your future IT career.

  What ''are the differences between a policy, a standard

What 'are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd