14. (10 Points) Suppose Proces A running on Host Process B running on Host Y vi running on Host Z is communicating with Process via a TCP connection. Let x, y, and z be the IP addresses o and Hos...
. Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 37 and destination port number 61. What are the source and destination port numbers for the segments traveling from Host B to Host A? . Suppose a process in Host C has a UDP socket with port number 6789. Sup- pose both Host A and Host B each send a UDP segment to...
Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up to and including byte 1029. Suppose Host A then sends three segments to Host B back-to-back. The first, second and third segments contain 1200, 150 and 80 bytes of data respectively. In the first segment, the sequence number is 1060, the source port number is 8080, and the destination port number is 80. Host B sends an acknowledgment whenever...
Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
rty. I 5. [16 pointsj Consider the function f(x, y,z) Let S denote the level surface consisting of all points in space such that f(,y,z)-4, and let P- (2,-2,1), which is on S. a) Calculate Vf. b) Determine the maximum value of Daf(P), where u is any unit vector at P c) Find the angle between Vfp and PO, where O denotes the origin. d) Find an equation for the tangent plane to S at P rty. I 5. [16...