subject

Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S all bytes up through byte 172. Now, Host S then sends three segments to Host R one after the other. The segments size are 80, 60, and 40 bytes respectively. In the first segment, the source port number is 310 and the destination port number is 112. Host R sends an acknowledgement whenever it receives a segment from Host S.

i. Give the sequence number, source port number, and destination port number for all the three segment?

ii. If the segments arrive at R in given order {1, 2, 3}, in the acknowledgment of the second arriving segment, what is the acknowledgement number, the source port number, and the destination port number?

iii. If the segments arrive at R in given order {1, 3, 2}, in the acknowledgment of the second arriving segment, what is the acknowledgement number, the source port number, and the destination port number?

iv. Lets suppose the three segments sent by S arrive in order at R. The second segment’s acknowledgment is lost and the third segment’s acknowledgment arrives after the timeout interval. Draw a timing diagram, showing these segments and all other segments and acknowledgments sent. Assume there is no additional packet loss. For each segment in your figure, provide the sequence number and the number of bytes of data; for each acknowledgement that you add, provide the acknowledgment number.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 12:30
Which is the best web development company in pakistan?
Answers: 1
question
Computers and Technology, 21.06.2019 18:20
Write a method replacekey in the minheap class with the following signature: public void replacekey(integer oldkey, integer newkey) the method will replace the first occurrence of oldkey with the newkey, and restore the min-heap property after the change. if the oldkey does not exist in the heap, the method prints an appropriate message and returns without changing the heap. example: suppose our binary heap object (bh) has the following keys: *** 4 6 7 32 19 64 26 99 42 54 28 then the method call: bh.replacekey (oldkey integer(54), newkey integer(2))
Answers: 1
question
Computers and Technology, 21.06.2019 21:30
Apower user needs you to install a second type of operating system on his computer to increase efficiency while running some specialized software programs. which installation technique should you use?
Answers: 3
question
Computers and Technology, 22.06.2019 02:30
If you turn on the lock alpha button , what happens
Answers: 1
You know the right answer?
Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has alread...
Questions
question
Social Studies, 20.10.2019 01:30
question
Social Studies, 20.10.2019 01:30
question
Social Studies, 20.10.2019 01:30
question
Geography, 20.10.2019 01:30
Questions on the website: 13722367