subject

A process on a host has a message of 2000 bytes to send to a process on another host. UDP and IPv4 is used to send this message from host 200.1.1.2 to host 64.120.1.253. The MTU is 1100 bytes. The header is a standard header with 0x24 as the identifier and type of service set to routine precedence and normal delay, normal throughput and high reliability. The datagrams are expected to take no more than 63 hops. The network layer at the source fragments the message sends two datagrams so that each fits in the MTU. The destination receives the two fragmented datagrams after a total of 10 hops. Give the IP datagrams received with as many fields filled with appropriate numerical values (in bits, hexadecimal or decimal format) as possible based on the information given. For fields whose numerical values cannot be determined, indicate their sizes in bytes.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:50
Using least squares fitting, you are to fit the data sets to the following models and solve for the parameters ai , where i is the index of the parameter. the input/output data for the systems are linked in the bblearn site. for each of the systems use matlab to plot the supplied data vs. the model fit on one plot. include your code in the solutions. (a) linear fit "lineardata.mat" y=a1x^3 + a2x^2 + a3x + a4 (b) plant fit "plantdata.mat g(s) = a1/(s + a2)
Answers: 1
question
Computers and Technology, 22.06.2019 17:40
Consider the simple 3-station assembly line illustrated below, where the 2 machines at station 1 are parallel, i.e., the product only needs to go through one of the 2 machines before proceeding to station 2.what is the throughput time of this process?
Answers: 2
question
Computers and Technology, 22.06.2019 19:10
How might the success of your campaign be affected if you haven’t carefully completed all field data or if you accidentally insert the wrong merge field in the document?
Answers: 1
question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
You know the right answer?
A process on a host has a message of 2000 bytes to send to a process on another host. UDP and IPv4 i...
Questions
question
Mathematics, 28.10.2020 20:00
question
Mathematics, 28.10.2020 20:00
question
Mathematics, 28.10.2020 20:00
question
Mathematics, 28.10.2020 20:00
Questions on the website: 13722360