Sequence number - transport layer, Computer Networking

Assignment Help:

Sequence Number

After  the bytes have been numbered TCP assigns a sequence number to each segment   that is  being sent. These sequence number for each segment  is the number of the  first  byte  carried  in that  segment.

The  value  in the  sequence  number fields of a segment defines the number of the first  data byte  contained in that  segment when a segment carries a combination of data and control  information. It uses a  sequence number. If a segment  does not  carry  user data. It does  not logically define a sequence number. The field  is there but the value  is not  valid. However some  segments  when carrying  only  control information  needs a sequence  number to allow  an acknowledgment form  the receiver. These segments  are used  for connection  establishment. Termination  or  abortion. Each  of these segment  consumes one sequence number  as through it carried i byte but  there are no actual data. If the randomly  generated  sequence number  is x the first  data  byte  is numbered x +1. The  byte  x is  considered a phony byte  that  is used for a control  segment  to a connection.


Related Discussions:- Sequence number - transport layer

Show the masking process, Q. Show the Masking process? Masking ...

Q. Show the Masking process? Masking Take out the address of the physical network from an IP address Used by routers inside the organization

What are local variables, What are local variables? Local varaiables ar...

What are local variables? Local varaiables are those which are declared within a block of code like methods. Local variables should be initialised before accessing them.

Butterfly permutation, Butterfly permutation This permutation is gettin...

Butterfly permutation This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

Firewalls, Firewalls Firewalls emerged as a new technology in 1990s but...

Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des

Odd-even merging circuit, Let us firstly illustrate the idea of merging two...

Let us firstly illustrate the idea of merging two sorted sequences using a odd-even merging circuit. The functioning of a merging circuit is as follows: 1)   Let there be two so

WOrkstation, Interdepences of workstation hardware and software

Interdepences of workstation hardware and software

Quality of service, Networks are more frequently being prepared to allow sp...

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para

How many types of twisted pair cable are there, How many types of twisted p...

How many types of twisted pair cable are there We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).

Throughput, Throughput is a calculate of the rate at which data can be tran...

Throughput is a calculate of the rate at which data can be transmit through the network. The throughput capability of the underlying hardware is known bandwidth. Because every fram

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd