Sequence number - transport layer, Computer Networking

Assignment Help:

Sequence Number

After  the bytes have been numbered TCP assigns a sequence number to each segment   that is  being sent. These sequence number for each segment  is the number of the  first  byte  carried  in that  segment.

The  value  in the  sequence  number fields of a segment defines the number of the first  data byte  contained in that  segment when a segment carries a combination of data and control  information. It uses a  sequence number. If a segment  does not  carry  user data. It does  not logically define a sequence number. The field  is there but the value  is not  valid. However some  segments  when carrying  only  control information  needs a sequence  number to allow  an acknowledgment form  the receiver. These segments  are used  for connection  establishment. Termination  or  abortion. Each  of these segment  consumes one sequence number  as through it carried i byte but  there are no actual data. If the randomly  generated  sequence number  is x the first  data  byte  is numbered x +1. The  byte  x is  considered a phony byte  that  is used for a control  segment  to a connection.


Related Discussions:- Sequence number - transport layer

Satellite radio channels - computer network, Satellite Radio Channels ...

Satellite Radio Channels A communication  satellite links two or more  earth  microwave transmitter receiver, know  as ground  stations. The satellite receives transmission on

Relevance and protection regarding dns attacks, Relevance and Protection re...

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

Layer on which layer does l2f, Write the layer on which layer does L2F, PPT...

Write the layer on which layer does L2F, PPTP and L2TP operate?

Message oriented middleware , What is Message Oriented Middleware (MOM)? ...

What is Message Oriented Middleware (MOM)? Ans) MOM permits general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate ove

Explain the acknowledged connectionless service, Explain the Acknowledged c...

Explain the Acknowledged connectionless service This is a cross between the previous two services. It provides that datagrams are to be acknowledged, but no prior logical conne

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd