Byte number - transport layer, Computer Networking

Assignment Help:

Byte Number

TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stores  them in the sending  buffer and number them. The numbering  does not necessarily start from0. Instead TCP generated a random number between 0 and 232-1 for  the number  of the  first byte  for  example  if the  random numbers  happens to be 1057 and the total  data to be sent are 6000 bytes,  are numbered from 1057 and 7056.

The bytes  of data  being  transferred in each  connection are numbered by TCP. The  numbering starts  with a randomly generated number.


Related Discussions:- Byte number - transport layer

Summary of osi model, Q. Summary of osi model? - There was no standard ...

Q. Summary of osi model? - There was no standard for networks in the early period and as a result it was difficult for networks to communicate with each other. - The ISO (In

Determine the application areas of intranet, Determine the Application area...

Determine the Application areas of intranet The uses of an Intranet are only limited by imagination. Some of the larger sectors where the Intranet can be easily and success fu

Name the protocol responsible for finding the mac address , a)  What does t...

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?   b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases

Reference models - fundamentals of networks, Reference models Design...

Reference models Designing  implementing and  manufacturing  computer  networks  and related  devices  are very  complex  activities. Therefore in order  for this  technolog

Determine the advantages of fast ethernet, Fast Ethernet Operates a...

Fast Ethernet Operates at 100 Mbps faster speeds required for image processing, CAD, real-time audio and video No change in frame addressing, format or access method

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

What is a management information base, What is a Management Information Bas...

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

Define character stuffing, Define Character Stuffing? In byte stuffing ...

Define Character Stuffing? In byte stuffing (or character stuffing), a particular byte is added to the data section of the frame when there is a character with the same pattern

5 igrp supports a feature , 5 IGRP supports a feature that permits traffic ...

5 IGRP supports a feature that permits traffic to be distributed among up to 6 (4 default) paths to give greater allover throughput and reliability. What is this called? Ans) An

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd