What would happen if a later sent 200 bytes of data to b

Assignment Help Basic Computer Science
Reference no: EM131045864

Suppose x and y are two TCP sequence numbers. Write a function to determine whether x comes before y (in the notation of Request for Comments 793, "x =

(a) Suppose the third party sends A a forged packet ostensibly from B and with 100 bytes of new data. What happens? Hint: Look up in Request for Comments 793 what TCP does when it receives an ACK that is not an "acceptable ACK."

(b) Suppose the third party sends each end such a forged 100-byte data packet ostensibly from the other end. What happens now? What would happen if A later sent 200 bytes of data to B?

Reference no: EM131045864

Questions Cloud

Design a reliable byte-stream protocol : The RTT of the network is 140 ms, and the maximum segment lifetime is 60 seconds. How many bits would you include in the Advertised Window and Sequence Num fields of your protocol header?
Local police department in order for department : 1. Suppose that a local government decides to provide more funds to the local police department in order for the department to hire additional police officers.  Is there an opportunity cost of this action?  If so, how would you ..
Full amount of the instrument with interest : $900.00 Smalltown, Illinois Maker, November 15, 2011 The undersigned promises to pay to the order of John Doe Nine Hundred Dollars with interest from date of note.
Explain the difficulty of doing this over a tcp connection : Suppose a host wants to establish the reliability of a link by sending packets and measuring the percentage that are received; routers, for example, do this.
What would happen if a later sent 200 bytes of data to b : Suppose the third party sends each end such a forged 100-byte data packet ostensibly from the other end. What happens now? What would happen if A later sent 200 bytes of data to B?
Purchased a used bmw from gary braden : On February 26, 2011, William Stem purchased a used BMW from Gary Braden for $26,600. Stem's primary purpose for buying the car was to use it to transport his child. Braden indicated to Stem that the car had not been wrecked and that it was in goo..
Difference as seen by host a between these two cases : Give an algorithmic description of what the TCP layer needs to do upon receiving a SYN packet. Consider the duplicate/new cases above, and the possibility that nothing is listening to the destination port.
What are comparable real salaries : What are comparable real salaries? A job paid $57,000 in 2002. The CPI in 1960 was 29.6, compared to 179.9 in 2002. In 1960, what salary would be comparable to 2002's $57,000 in real terms?
How would you determine the numbers given above : How would you determine the numbers given above, and which values might be less certain?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Develop requirements traceability matrix

The GlobalUBid.Com Case Study will be used to develop a requirements traceability matrix describing and following the life of requirements in both the forward and backward direction.

  Demonstrate the class in a program

Demonstrate the class in a program that asks the user for the quantity of items being purchased, and then displays the sale's subtotal, amount of sales tax, and total

  Evaluate online tutorials and online communities

Ray and Jason have just finished developing the documentation for a system your team recently completed. Ray insists that the documentation should be printed in booklet format and included with the system.

  Describe tttc management significance of observing user

Using at least two articles for support, describe to TTTC management the significance of observing user reaction, suggestions, and innovations in prototyoping process.

  Identify your chosen organization''s significant it challenge

From the e-Activity, identify your chosen organization's significant IT challenges, the Windows Server 2012 edition it chose to meet these challenges, and the most significant operational benefits it derived from this choice. Compare and contrast at ..

  Human being

Computers can do better than Human being

  How does the failure region ofthe equality constraint differ

How does the failure region of the equality constraint differ from that of the inequality constraint studied in the earlier examples?

  Write a simple atm program in python

Write a simple atm program in Python. Ask the user to enter their account number, and then print the beginning balance.

  Cloud technology and virtualization

With the merger of your company with a multinational company, you have come to realize that progressive solutions are necessary to defray some of the associated information technology costs

  Sort the data by name

In C language, Menu allow the user to: 1. sort the data by name (using qsort function), 2. sort the data by calories (using qsort function), 3. add information for a pizza, 4. modify pizza information

  Determine the number of distinct labelling of knn do the

1. determine the number of distinct labelling of knn. do the same for kmm and kmnl2. give an example of a graph g with

  A program that accepts insurance policy data

A program that accepts insurance policy data, including a policy number, customer last name, customer first name, age, premium due date (month, day, and year), and number of driver accidents in the last three years. If an entered policy number is not..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd