What is the maximum size of receive window in a tcp header

Assignment Help Computer Networking
Reference no: EM131947013

LAB Assignment: Learning about the Simple Lightweight Transport Protocol (SLTP)

This Lab is divided into 2 main parts

1) Learning about the New Transport Protocol
2) Running the Simple Lightweight Transport Protocol

LOGGING ON

If you are on dual-booted machine: logon as admin

User name: admin
Password: greatjob

If you are using a virtual machine; Please use the login sequence given to you by your Lab tutor

PART1: Learning about the New Transport Protocol

PART1 is divided into 4 sections:

1. Why design a New Transport Protocol
2. Looking at the TCP header
3. Looking at the SLTP: header
4. Difference between TCP and SLTP

SECTION1: Why design a new Transport Protocol

Download the SLTP specification in the Lab folder. Read the Introduction and answer the following questions. What was the motivation behind the creation of SLTP?

What is a VANET network why are VANETs different from other networks.

Why doesn't TCP perform well on VANET networks?

SECTION2: Look at the TCP header

Answer the following questions:

1) What units are used for the sequence number and the acknowledgement number?

2) What is the maximum size of the receive window in a TCP header?

3) Does TCP use have a packet type field? How does TCP know which type of packets that are being received?

4) Describe how TCP starts a connection: describe the packets exchanged

5) Describe how TCP ends a connection: describe the packets exchanged

6) How does TCP prevent replay attacks?

7) Describe how TCP does flow control?

SECTION 3: Looking at an SLTP header

Look at the SLTP specification and answer the following questions:

1) What units mess_seq_no and the mess_ack_no in SLTP?

2) What is the maximum size of the receive window in a SLTP header?

3) Does SLTP use have a packet type field? How does SLTP know which type of packets that are being received?

4) Describe how SLTP starts a connection: describe the packets exchanged

5) Describe how SLTP ends a connection: describe the packets exchanged

6) How does SLTP prevent replay attacks?

7) Describe how SLTP does flow control?

Attachment:- LAB Assignment.rar

Reference no: EM131947013

Questions Cloud

Determine the process customer sales and returns : You have decided that you will need to hire several employees to work in the store and plan to have two people working together for each shift.
Momentum and kinetic energy conservation : Elastic Collisions: A 2 kg object moving 4 m/s to the right collides elastically with a 4 kg object moving 1 m/s to the left.
Brick wall and comes to a dead stop : A person who has a mass of 100kg is skateboarding to the right at a speed of 9.0m/s when he smacks into a brick wall and comes to a dead stop in 0.2s.
Describe the possbile roles of the local government : Describe the possbile roles of the local, state and federal government in this scneario. This is in regards to a disaster management course.
What is the maximum size of receive window in a tcp header : What units are used for the sequence number and the acknowledgement number? What is the maximum size of the receive window in a TCP header?
What was the seal speed : 1) What distance did the seal cover in making this dive? 2) What was the seal's speed, in m/s?
Identify one of the three levels of management : Complete the POLC Learning Activity and take a screen shot and insert it into the top of the Assignment document.
Create a risk register that identifies eight risks : Explain how each risk stems from the described source(s) (suggested length of 1-2 sentences for each source).
What is the maximum speed of the pendulum : A pendulum consists of a paint can weighing 5.9 kg at the end of a string the length of 3 m.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe step-by-step the procedure of the routing process

Analyze and assess the consequence when a second topology change emerges before a network is able to converge on the first change in a network which uses Routing Information Protocol (RIP). Use diagrams to support your explanation

  Rize nos which can be implemented to achieve this

you work for a small computer reseller located in the southeast united states. the company started 2 years ago and has

  What is utc and why is it used

The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together.

  How long does b takes to acknowledge

Assume that no packet or acknowledgement are dropped. Assume that A sends a packet to C and waits for its acknowledgement to come back from C. How long does it take until A gets that acknowledgement?

  Designing a secure network

Designing a Secure Network

  Share resources on wins server

Client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why?

  How would you ensure that critical update affecting security

How would you ensure that a critical update affecting security is delivered to all the clients using the application? Discuss what you would use for this delivery. Make sure to give advantages and disadvantages to this software.

  How can management tool automate user account administration

Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration

  Define the fact and friction according to the topics

Classify the list of topics below as fact or fiction (argument in favor of your classification and cite works from the literature as support).

  Find number of routers the university require to connect

Find out the number of routers the university will require to connect all its buildings to internet (including the main router of the university). Sketch small diagram describing configuration you are suggesting.

  Would a packet-switched network or a circuit-switched

consider an application that transmits data at a steady rate for example the sender generates an n-bit unit of data

  What role do you think ids should have in security posture

What role do you think IDS (network and/or host-based) should have in the security posture of a home network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd