Explain how tcp handles connection-setup management, Computer Networking

Assignment Help:

Problem:

(a) Explain how TCP handles connection-setup management.

(b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are usually written as a series of four decimal numbers. IPv4 addresses traditionally belong to one of five classes of address, depending on the type of network.

i. Give the address range for a Class D network.
ii. What are Class D network addresses primarily used for?
iii. Can two hosts A and B with IP addresses 172.16.17.25 and 172.16.27.25 respectively communicate directly with each other if they
share a subnet mask of 255.255.248.0?
iv. Describe one short-term technique which has been used to solve the shortage of IPv4 addresses?

(c) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem.

You should give the value of the key fields used in fragmentation for each fragment created.


Related Discussions:- Explain how tcp handles connection-setup management

Packet loss and retransmission in tcp, Packet loss and retransmission in TC...

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no

Find the appropriate layer of the OSI or hub, • This device creates one big...

• This device creates one big collision domain and one large broadcast domain.

Netware protocol provides link-state routing, Which NetWare protocol provid...

Which NetWare protocol provides link-state routing? Ans) NetWare Link Services Protocol (NLSP) gives link-state routing. SAP (Service Advertisement Protocol) advertises network

Explain the anonymous ftp, What is anonymous FTP? Anonymous FTP is a wa...

What is anonymous FTP? Anonymous FTP is a way of granting user access to files in public servers. Users that are permitted access to data in these servers do not require identi

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

What is sap, What is SAP? Series of interface points that permit other ...

What is SAP? Series of interface points that permit other computers to interact with the other layers of network protocol stack is known as SAP.

Infant mortality period, INFANT MORTALITY PERIOD Initially there are a ...

INFANT MORTALITY PERIOD Initially there are a large number of failures, called initial failures or infant mortality. These failures are primarily due to manufacturing defects,

Types of wires, TYPES OF WIRES:  Cable used for wiring would match the...

TYPES OF WIRES:  Cable used for wiring would match the following: The intended speed The distance between computers The amount of noise Anticipated future r

Internet transport service proposal, will you have this done to day? And ho...

will you have this done to day? And how long will this take?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd