1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
11

Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f

rom 1 through 233. Now, Host S then sends three segments to Host R back to back. The segments size are 50, 70, and 90 bytes respectively. In the first segment, the source port number is 212 and the destination port number is 80. Host R sends an acknowledgement whenever it receives a segment from Host S.
a. Give the sequence number, source port number, and destination port number for all the three seg- ments.
b. If the segments arrive at R in given order 1, 2, 3, what is the acknowledgement number, the source port number, and the destination port number in the acknowledgment of the second arriving segment?
c. If the segments arrive at R in given order 1, 3, 2, what is the acknowledgement number, the source port number, and the destination port number in the acknowledgment of the second arriving segment?
d. Lets suppose the three segments sent by S arrive in order at R. The first segments acknowledgment there is no additional packet loss. For each segment in your figure, provide the sequence number and the number of bytes of data; for each acknowledgement that you add, provide the acknowledgment number.

Computers and Technology
1 answer:
never [62]3 years ago
4 0

Answer:

Consider the given data

There are two host S and R communicating over a TCP connection.

Host R received from S all bytes from 1 through 233.

Host S sends three segments to Host R.

The sizes of the three segments are 50, 70, and 90 bytes.

In the first segment, the source port number is 212 and the destination port number is 80.

a)

For segment 1:

As, Host R received 233 bytes from Host S, the sequence number of the first segment is 234.

The source port number = 212

The destination port number = 80.

For segment 2:

As the first segment size is 50 bytes and the sequence number of the first segment is 234, the sequence number of the second segment will be 50+ 234= 284.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

For segment 3:

As the second segment size is 70 bytes and the sequence number of the second segment is 284, the sequence number of the third segment will be 70+ 284= 354.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

b)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 2, 3.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 3. The sequence number of the segment 3 is 354.

Therefore, the acknowledgement number of the second segment arriving is 354.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

c)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 3, 2.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 2. The sequence number of the segment 2 is 284.

Therefore, the acknowledgement number of the second segment arriving is 284.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

d)

The first segment acknowledge is the sequence number of the second segment that is lost.

The second and third segment acknowledgements arrive after the timeout interval. The timing diagram of these segments along with their sequence number and the number of bytes of data is shown in the below diagram.

Explanation:

See the attached picture for timing diagram.

You might be interested in
In a packet voice communications system, a source transmits packets containing digitizedspeech to a receiver. Because transmissi
omeli [17]

The answer & explanation for this question is given in the attachment below.

5 0
3 years ago
Due to the difficult economic times, increased global competition, demand for customization, and increased consumer sophisticati
Lunna [17]

Answer:

b. False

Explanation:

Difficult economic times, increased global competition, demand for customization, and increased consumer sophistication does not direct companies to hire more employees and outsource middle managers.

Rather, companies tend to invest new technologies, information systems to satisfy the needs in global competition, consumer sophistication and customization.

Middle managers outsourced cannot deal these issues effectively, therefore they need to be company employees.  

In difficult economic times, companies does not want to hire extra employees because of increased cost.

8 0
3 years ago
The system tray contains _____.
xeze [42]

Answer:

the system tray is located in the Windows Taskbar (usually at the bottom next to the clock) and contains miniature icons for easy access to system functions such as fax, printer, modem, volume, and more. Double click or right click on an icon to view and access the details and controls.

Explanation: in window 95

7 0
3 years ago
Read 2 more answers
Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every _______ in order to maintain an upda
densk [106]

Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every 31 days in order to maintain an updated database of people.

<h3>What telemarketing firms do?</h3>

The act of telemarketing is known to be the act talking to potential or existing customers through the use of a telephone.

Conclusively, Note that Telemarketing can help a business firm to promote or boast their products or services, make their customer database stronger, bring about a lot of leads and appointments and others.

Learn more about telemarketing from

brainly.com/question/25974538

6 0
2 years ago
Do you guys know the addition and subtraction of binary numbersi need help in that
Gala2k [10]

Answer:

The process of adding binary numbers is the same as the process adding decimal numbers which are the normal base 10 numbers with the difference being that in decimal numbers there are digits 1 to 9 and in binary numbers, there are only digits 1 and 0

So when we add binary numbers, we havr;

0 + 0 = 0

1 + 0 = 1

0 + 1 = 1

1 + 1 = 10

Why 1 + 1 = 10 is because, there are no 2s in binary number system, just like when we get from 0 to 9 in a decimal system we start again at 10

For binary subtraction, we have the following;

0 - 0 = 0

1 - 0 = 1

1  - 1 = 0

10 - 1 = 1 (from 1 + 1 = 10)

For example 1100₂ - 1010₂ = 0010₂

As shown below

Borrow 1

,     ↓

 1, 1 ¹0 0

<u>  1, 0 1 0</u>

, 0  0  1  0

The addition and subtraction of the binary number system are similar to that of the decimal number system. The only difference is that the decimal number system consists the digit from 0-9 and their base is 10 whereas the binary number system consists only two digits (0 and 1) which make their operation easier

Explanation:

4 0
3 years ago
Other questions:
  • How should a cover letter begin?
    13·2 answers
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • Write a function listLengthOfAllWords which takes in an array of words (strings), and returns an array of numbers representing t
    14·1 answer
  • The keywords used in programming languages that use decisions to redirect the flow of a program are called __
    13·1 answer
  • Big films with big budgets typically have a few animators working on them. True False
    11·1 answer
  • Which of the following is most likely to include technical vocabulary?
    7·1 answer
  • Write 4 types of viruses , explain them briefly.
    7·1 answer
  • . When attempting to minimize memory usage, the most efficient way to do group processing when using the MEANS procedure is to u
    13·1 answer
  • Why are digital signals an accurate and reliable way to record and send information?
    13·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!