Was the entire transaction completed, Computer Networking

Assignment Help:

The following information was obtained from a host computer:

00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 20964)
00:05:17.176700 64.254.128.66.25 > 74.125.228.54.1270: S 774583594:774583594(0) ack 2688560410 win 8760 (DF) (ttl 64, id 35473)
00:05:17.302784 74.125.228.54.1270 > 64.254.128.66.25: . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 64.254.128.66.25 > 74.125.228.54.1270: P 1:93(92) ack 1win 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 74.125.228.54.1270 > 64.254.128.66.25: P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 64.254.128.66.25 > 74.125.228.54.1270: P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 74.125.228.54.1270 > 64.254.128.66.25: P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 64.254.128.66.25 > 74.125.228.54.1270: P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 74.125.228.54.1270 > 64.254.128.66.25: P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 64.254.128.66.25 > 74.125.228.54.1270: . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 64.254.128.66.25 > 74.125.228.54.1270: P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 74.125.228.54.1270 > 64.254.128.66.25: P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 64.254.128.66.25 > 74.125.228.54.1270: P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 74.125.228.54.1270 > 64.254.128.66.25: P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 74.125.228.54.1270 > 64.254.128.66.25: . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 64.254.128.66.25 > 74.125.228.54.1270: . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 74.125.228.54.1270 > 64.254.128.66.25: P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 64.254.128.66.25 > 74.125.228.54.1270: P 323:367(44) ack 3698 win 8760 (DF) (ttl 64, id 35552)
00:05:18.979682 74.125.228.54.1270 > 64.254.128.66.25: P 3698:3704(6) ack 367 win 17520 (DF) (ttl 46, id 21900)
00:05:18.979877 74.125.228.54.1270 > 64.254.128.66.25: F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901)
00:05:18.979957 64.254.128.66.25 > 74.125.228.54.1270: . ack 3705 win 8754 (DF) (ttl 64, id 35571)
00:05:18.983169 64.254.128.66.25 > 74.125.228.54.1270: F 412:412(0) ack 3705 win 8760 (DF) (ttl 64, id 35574)

a. Describe what is occurring and how do you know?

b. Was the entire transaction completed?

c. Did this transaction use TCP, UDP or something else? How do you know?


Related Discussions:- Was the entire transaction completed

Client-server , We need to design and implement a secure conference system....

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversat

What is nic - networking, NICs Network interface cards, commonly referr...

NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network. The NIC gives a physical connection among the networking medium and the comput

Use of two-layer switch, Q. Use of Two-Layer Switch? - Performs at the ...

Q. Use of Two-Layer Switch? - Performs at the physical as well as data link layer - A bridge with many ports designed for faster performance - Allocates unique port to ea

Substantial capital investments in new networks, Question: (a) How can...

Question: (a) How can governments provide the mobile industry with the long-term clarity and certainty it needs to make substantial capital investments in new networks? (b)

Explain in brief -ring topolgy, Explain in brief -Ring Topolgy Comments 1 ...

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

What is ring topology, What is Ring Topology? The physical ring topolog...

What is Ring Topology? The physical ring topology is a circular loop of point-to-point links. Every device connects directly to the ring or indirectly by and interface device o

What is bit stuffing, What is Bit Stuffing? Bit stuffing is the process...

What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0

Design a banking network, You have been asked to design a Banking Network w...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd