1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
4 years ago
10

Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Sup

pose Host A then sends two segments to Host B back-to-back. The first and second segments contain 50 and 100 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgement whenever it receives a segment from Host A.
1.In the second segment sent from A to B, what are the sequence number, source port number and destination port number?

2.If the first segment arrives before the second segment, in the acknowledgment of the first arriving segment, what is the acknowledgment number, the source port number and destination port number?

3.If the second segment arrives before the first segment, in the acknowledgment of the first arriving segment, what is the acknowledgment number?

4.Suppose the two segments sent by A arrive in order at B. The first acknowledgment is lost and the second acknowledgment arrives after the first timeout interval. Draw a timing diagram, showing these segments and all other segments and acknowledgments sent. (Assume there is no additional packet loss).

Computers and Technology
1 answer:
Tresset [83]4 years ago
3 0

Answer:

1) sequence number=207 ,Source port number = 302, Destination port number= 80

2) Acknowledgement number= 207, Source port number = 80                   Destination port number= 302

3) Acknowledgement number=127

4) View the attached file for the Timing diagram

Explanation:

1) The sequence number is 127 + 80 = 207, the source port number is 302, and the destination port number is 80.

2) The acknowledgement number is 207, source port number is 80 and the destination port number is 302 if the first segment arrives before the second segment, in the acknowledgment of the first arriving segment.

3) The acknowledgement number is 127, indicating that the receiver is still waiting for bytes 127 and onward.

4) View attached file.    

You might be interested in
Refer to the exhibit. pc1 issues an arp request because it needs to send a packet to pc3. in this scenario, what will happen nex
Sauron [17]
RT1 will send an ARP answer with its own particular Fa0/0 MAC address.When a system gadget needs to speak with a gadget on another system, it communicates an ARP ask for requesting the default portal MAC address. The default portal (RT1) unicasts an ARP answer with the Fa0/0 MAC address.
5 0
3 years ago
Write a program to prepare the monthly charge account statement for a customer of CS CARD International, a credit card company.
WITCHER [35]

Answer:

import java.util.*;

import java.text.*;

class CreditCardBill

{

public static void main(String[] args)

{

Scanner sc = new Scanner(System.in);

NumberFormat defaultFormat = NumberFormat.getCurrencyInstance(Locale.US);

System.out.println("CS Card International Statement");

System.out.println("===============================");

System.out.print("Previous Balance: $");

double prevBalance = sc.nextDouble();

System.out.print("Additional Charges: $");

double addCharges = sc.nextDouble();

double interest;

if(prevBalance == 0)

interest = 0;

else

interest = (prevBalance + addCharges) * 0.02;

System.out.println("Interest: "+defaultFormat.format(interest));

double newBalance = prevBalance + addCharges + interest;

System.out.println("New Balance: "+defaultFormat.format(newBalance));

double minPayment;

if(newBalance < 50)

minPayment = newBalance;

else if(newBalance <= 300)

minPayment = 50.00;

else

minPayment = newBalance * 0.2;

System.out.println("Minimum Payment: "+defaultFormat.format(minPayment));

}

}

5 0
3 years ago
Once a virus has been removed by your anti-virus program, all traces of it are gone from your computer.
pychu [463]
Im pretty sure that is false
5 0
3 years ago
1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
alukav5142 [94]

Answer:

true

Explanation:

everything is computerized. banks, shopping, financial business records, ect

7 0
3 years ago
Solve 9x+c=k for x iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
mr Goodwill [35]

Explanation:

Hey there!

Here,

Given;

9x + c = k

<u>Shift</u><u> </u><u>"</u><u>c"</u><u> </u><u>to</u><u> </u><u>right</u><u> </u><u>side</u><u>.</u>

<u>9x = k - c</u>

<u>Divide</u><u> </u><u>"</u><u>k-c"</u><u> </u><u>by</u><u> </u><u>9</u><u>.</u>

<u>x =  \frac{k - c}{9}</u>

<u>Therefore</u><u>, </u><u> </u><u>x</u><u> </u><u>=</u><u> </u><u>(</u><u>k-c</u><u>)</u><u>/</u><u>9</u><u>.</u>

<em><u>Hope it helps</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

3 0
4 years ago
Other questions:
  • Determine the efficiency and big-O notation for the following algorithm:
    13·1 answer
  • In normal view, powerpoint's ________ contains buttons such as notes, comments, and view.
    14·1 answer
  • Complex machines are defined by...
    14·2 answers
  • How does technology improve productivity at home? (Select all that apply.)
    5·1 answer
  • What type of microscope requires a nonmetal sample to be prepared for viewing by coating it with a thin layer of a conductive ma
    9·2 answers
  • When you evaluate the use of digital media, how has it affected the newspaper business? The rise of digital media has caused new
    15·1 answer
  • Human services organizations seek to make changes and help people in need to improve their .
    9·1 answer
  • Develop a program working as a soda vending machine. The program should show the product menu with price and take user input for
    11·1 answer
  • Can u please help me solve this
    15·1 answer
  • _______ is a very common approach to multisystem authorization.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!