Question about tcp networking

Assignment Help Computer Networking
Reference no: EM1379644

A TCP entity in Host 1 receives a segment from a corresponding TCP entity in Host 3. The received segment has the following header field values set: sequence number = 245553231, acknowledgment number = 45838821, A bit = 1,  P bit = 1, U bit = 1, window size field = 1000, urgent pointer field = 5000. In addition, the segment has no options and contains 2000 bytes of data.
a. What is the range of sequence numbers for the 2000 incoming bytes contained within the segment?
b. What is the next byte that Host 1 is expected to send to Host 3 on this TCP connection?
c. What is the range of bytes that Host 1 is permitted to send to Host 3 on this connection?
d. What should Host 1 do with the 2000 data bytes contained within the segment?
e. Is the TCP entity in Host 1 operating in urgent mode or normal mode on this connection?
f. If the TCP entity in Host 1 is operating in urgent mode on this connection, then at what sequence number will the TCP entity in Host 1 return to normal mode on this connection? Ignore sequence number wrap around.

Reference no: EM1379644

Questions Cloud

Find the sizes of the tag, block and word fields : Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.
Format of a memory address : Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.
Question about memory effectiveness : The following memory partitions of 100 kb, 500 kb, 200 kb, 300 kb, and 600 kb, how would each of the 1st-fit, best-fit, and worst-fit algorithms place processes of 212 kb, 417 kb, 112 kb, and 426 kb?
Comparing the cache blocks : A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.
Question about tcp networking : A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se
Arrangement of subnet masks : An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:
Discussion about networking a small business : Assume you have been employed as a consultant to suggest a retailing corporation about ways in which it can use networking technology to enhance its business.
Research proposal topic : You need to  select and present their own researchable topic for the research proposal in this course .Students are not limited to the topic suggestions listed in exercise 1 on page 76.Complete exercises 1-9 on page 76 in the text to help you sel..
Difference between wats and leased lines : Discuss the differences between Wide Area Telecommunications Service and leased lines?

Reviews

Write a Review

Computer Networking Questions & Answers

  What routing protocol is suitable for retail customer

What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.

  Explaining sliding window protocol with the window size

Terminal A is sending data to terminal B using a sliding window protocol with the window size equal to 5 and the maximum sequence number equal to 6.

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Explain different strategies-transfer file between computers

In second strategy, packets are not acknowledged individually, but whole file is acknowledged when it arrives. Explain the two approaches.

  Congestion control in error-free virtual circuit subnet

Consider the following method for congestion control in a error-free virtual circuit subnet.

  Network management system on acurrently-dated vendor website

Write a two-and-a-half-page paper explaining network management system identified on acurrently-dated vendor website (Cisco, HP, Sun, SolarWinds, CA, Network General, IBM, etc.).

  Install backbone to connect four base-t ethernet lans

You have been hired by a small company to install backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to give a connection to Internet. Develop simple backbone and determine total cost.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Investigate employees connect using wireless and not cables

You are the Network Manager for a large bank. You have been asked to investigate having employees connect using wireless and not cables.

  Explain packet-by-packet fair queueing system-logical buffer

Consider a packet-by-packet fair queueing system with three logical buffers and with service rate of one unit/second. Show the sequence of transmissions for this system.

  Kinds of wireless wan services are available today

What kinds of wireless WAN services are available today? What standards are involved with wireless WAN services? What kinds of issues might you encounter?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd