Maximum value of l-tcp sequence number are not exhausted

Assignment Help Computer Networking
Reference no: EM1353143

Consider transferring an enormous file of L bytes from Host X to Host Y. Assume an MSS of 1460byets.

i. What is the maximum value of L such that TCP sequence numbers are not exhausted? Give proper justification?

ii. For the L you obtained above in (i), find how long it takes to transmit the file and also mention how many segments are created? Assume that a total of 66 bytes of transport, network and data-link header are added to each segment before the resulting packet sent out over a 10Mbps link. Ignore flow and congestion control so X can pump out the segments back to back and continuously.

Reference no: EM1353143

Questions Cloud

Compute the value of stock : Brushy Mountain Mining Corporation's ore reserves are being depleted, so its sales are falling. Also, its pit is getting deeper each year, so its costs are increasing.
Create a dtd for a small xml data set : Create a DTD for a small XML data set drawn from the Stanford course catalog. There are multiple departments, each with a department chair.
Explain how have our payment systems : Explain how have our payment systems or other policies in history embraced the health economics picture?
Specific personality characteristics or traits : Please discuss at least three of your specific personality characteristics or traits. Using your life experiences, explain how these characteristics were developed.
Maximum value of l-tcp sequence number are not exhausted : Consider transferring an enormous file of L bytes. What is the maximum value of L such that TCP sequence numbers are not exhausted? Give proper justification?
What is the magnitude of the second charge : A negative charge of -2.0 multiplied by 10-4 C and a positive charge of 9.5 multiplied by 10-4 C are divided  by 0.30 m. What is the force between the two charges.
Demand and supply of meat and meat products : What kind of effect do you expect to see on the equilibrium price and quantity of meat and describe your answer in terms of shifts in demand and supply of meat and meat products.
Does the nominal interest rate adjust more : Does the nominal interest rate adjust more than one-for-one or less than one for one to expected inflation.
Illustrate what conclusions can you draw about similarity : Illustrate what conclusions can you draw about the similarities and differences between the EU and globalization.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd