1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
11

Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f

rom 1 through 233. Now, Host S then sends three segments to Host R back to back. The segments size are 50, 70, and 90 bytes respectively. In the first segment, the source port number is 212 and the destination port number is 80. Host R sends an acknowledgement whenever it receives a segment from Host S.
a. Give the sequence number, source port number, and destination port number for all the three seg- ments.
b. If the segments arrive at R in given order 1, 2, 3, what is the acknowledgement number, the source port number, and the destination port number in the acknowledgment of the second arriving segment?
c. If the segments arrive at R in given order 1, 3, 2, what is the acknowledgement number, the source port number, and the destination port number in the acknowledgment of the second arriving segment?
d. Lets suppose the three segments sent by S arrive in order at R. The first segments acknowledgment there is no additional packet loss. For each segment in your figure, provide the sequence number and the number of bytes of data; for each acknowledgement that you add, provide the acknowledgment number.

Computers and Technology
1 answer:
never [62]3 years ago
4 0

Answer:

Consider the given data

There are two host S and R communicating over a TCP connection.

Host R received from S all bytes from 1 through 233.

Host S sends three segments to Host R.

The sizes of the three segments are 50, 70, and 90 bytes.

In the first segment, the source port number is 212 and the destination port number is 80.

a)

For segment 1:

As, Host R received 233 bytes from Host S, the sequence number of the first segment is 234.

The source port number = 212

The destination port number = 80.

For segment 2:

As the first segment size is 50 bytes and the sequence number of the first segment is 234, the sequence number of the second segment will be 50+ 234= 284.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

For segment 3:

As the second segment size is 70 bytes and the sequence number of the second segment is 284, the sequence number of the third segment will be 70+ 284= 354.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

b)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 2, 3.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 3. The sequence number of the segment 3 is 354.

Therefore, the acknowledgement number of the second segment arriving is 354.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

c)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 3, 2.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 2. The sequence number of the segment 2 is 284.

Therefore, the acknowledgement number of the second segment arriving is 284.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

d)

The first segment acknowledge is the sequence number of the second segment that is lost.

The second and third segment acknowledgements arrive after the timeout interval. The timing diagram of these segments along with their sequence number and the number of bytes of data is shown in the below diagram.

Explanation:

See the attached picture for timing diagram.

You might be interested in
The inflationary gap occurs when you obtain no increase in output, but only an increase in the Average Price Level from an incre
Katarina [22]
<span>B. Second phase of the Keynesian LRAS Curve.</span>
8 0
3 years ago
Who is this person?<br><br><br> Kaneppeleqw. I see them everywhere. Are they a bot? Are they human?
Effectus [21]
I’m not sure. Maybe a human.
6 0
3 years ago
Write a new program called Lab7D that will read strings from a text file and turn them into "encrypted code". Create a bool func
Aliun [14]

Answer:

I am writing a C program for the first part and Python program for the second part of the question.    

<h2>1st program:</h2>

#include <stdio.h>  //to use input output functions

#include <stdlib.h>  // used here to access exit function

void main() {  //start of the main() function body

char fname[100], character;

// fname is the name of the input file which contains characters and character //variable is used to store characters

FILE *original, *temporary;  

/* two pointers of File type: original is used for the original input file and temporary is used for a temporary file name aux.txt */

printf("Enter the name of the text file to encrypt : ");

//prompts the user to enter the name of the file to be encrypted

scanf("%s",fname); //reads the name of the file from user

original=fopen(fname, "r"); //open the input file in read mode

if(original==NULL)  {

//displays the following message if the file is empty or does not exists

 printf("Cannot open original file");  

 exit(1);  }  //program exits

temporary=fopen("aux.txt", "w");

//creates a temporary file named aux.txt and open that file in write mode

if(temporary==NULL)  { //if temporary file could not be created

 printf("Cannot create a temporary file");

 fclose(original); //closes the original input file

 exit(2);  }  //program exits

while(1)  {

 character=fgetc(original);  

/*pointer original moves through the input file and gets input from original input file one character at a time and store it in character variable */

 if(character==EOF)  

//when all characters are obtained and pointer is at end of file  {

  break;  //the loop breaks }

 else   {  //if EOF is not yet reached

  character=character+100;  

//add 100 to each character to encrypt the characters

  fputc(character, temporary);

 // fputc() writes a single character at a time to aux file } }

fclose(original);  //closes input file

fclose(temporary); //closes aux file

original=fopen(fname, "w");  //opens input file in write mode

if(original==NULL) { //if file does not exist display following message

 printf("Cannot open the original file to write");

 exit(3);  } //program exits

temporary=fopen("aux.txt", "r"); //open aux.txt file in read mode

if(temporary==NULL)  { //if pointer temporary is NULL

 printf(" Cannot open temporary file to read");

 fclose(original);  //closes input file

 exit(4);  } //program exits

while(1)  {

 character=fgetc(temporary);

//obtains every character from aux file pointed by temporary

 if(character==EOF)  //if end of file is reaced {

  break;   } //the loop breaks

 else   { //if end of file is not reached

  fputc(character, original);  

//puts every character to input file }  }

printf(" %s is encrypted \n", fname);  

//displays this message when input file is successfully encrypted

//closes input and aux text files

fclose(original);

fclose(temporary); }  

Explanation:

The program first asks the user to enter the name of the file. Then the program uses two pointers original for input file and temporary for aux text file. It first opens the file whose name is entered by the user and reads that file by getting each single character using fgetc() until the pointer reaches the end of the file. While reading each character of the input file, it encrypts every character using and puts that encrypted content in temporary file names aux.txt using fputc() until the pointer reaches the end of the file. Lastly all the encrypted strings of the are placed in the original input text file.

<h2>Second program:</h2>

# bool function that accepts character as parameter and returns true if its a #vowel and false otherwise

def isVowel(character):  

   if character.lower() in 'aeiou':  #converts uppercase char to lowercase

       return True  #return true if character is a vowel    

   else:

       return False #returns false if input character is not a vowel

The program has a function isVowel() which takes a character as a parameter to check if that character is a vowel. If character is in uppercase  letters, it handles these characters using lower() method to convert the character to lowercase and then returns true if that character is a vowel otherwise returns false. To check the working of the function you can replace True and False with print statement such as:

if character.lower() in 'aeiou':

       print("It is a vowel")

   else:

       print("It is not a vowel")

And after that you can call this function and pass a character to it as:

isVowel('i')

5 0
3 years ago
Write a program that prompts the user to enter a series of numbers between 0 and 10 asintegers. The user will enter all numbers
Anna71 [15]

Answer:

The program in Python is as follows:

import collections

from collections import Counter

from itertools import groupby

import statistics

str_input = input("Enter a series of numbers separated by space: ")

num_input = str_input.split(" ")

numList = []

for num in num_input:

         if(num.lstrip('-').isdigit()):

                   if num[0] == "-" or int(num)>10:

                             print(num," is out of bound - rejecting")

                   else:

                             print(num," is valid - accepting")

                             numList.append(int(num))

         else:

                   print(num," is not a number")

print("Largest number: ",max(numList))

print("Smallest number: ",min(numList))

print("Range: ",(max(numList) - min(numList)))

print("Mode: ",end = " ")

freqs = groupby(Counter(numList).most_common(), lambda x:x[1])

print([val for val,count in next(freqs)[1]])

count_freq = {}

count_freq = collections.Counter(numList)

for item in count_freq:

         print(item, end = " ")

         lent= int(count_freq[item])

         for i in range(lent):

                   print("#",end=" ")

print()

Explanation:

See attachment for program source file where comments are used as explanation. (Lines that begin with # are comments)

The frequency polygon is printed using #'s to represent the frequency of each list element

7 0
3 years ago
Assume values 10, 20, 30, and 40 are entered in the cell range A1:A4. Cell A10 contains the formula: =A1+A2+A3+A4 and displays v
r-ruslan [8.4K]

Answer:

The formula and value to this question is "=A1+A3+A4+A5 with value 100"

Explanation:

The explanation of the given question as follows:

  • In question, it is defined that four cells that are "A1, A2, A3, and A4"  contains value that are "10, 20, 30, and 40".
  • To add these values we use addition formula that is "=A1+A2+A3+A4". it will give value 100.
  • If the user inserts a new row that is "A2" and assigns a value in the cell that is "50" so, we use the above formula that adds values with these values we also use the value "100".
8 0
3 years ago
Other questions:
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • // This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
    12·1 answer
  • What is the keyboard shortcut Ctrl+Z used for?
    14·2 answers
  • Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
    13·1 answer
  • What is wrong with line 1?
    14·1 answer
  • Discussion Six: Code of Ethics IT workers have many different relationships, including those with employers, clients, suppliers,
    7·1 answer
  • Suppose cell C5 contains the formula =B$6+C1.
    6·1 answer
  • What are the peripherals of a computer ​
    12·1 answer
  • You upgrade a graphics workstation with a HyperThreading-enabled CPU core. You expect the programs on the desktop to run much fa
    12·1 answer
  • Is TCP really more secure than other L4 protocols by default?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!