Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
In TCP Header format if a device wants to send 8 bytes of data. Is it valid or not? Explain why
+1
vote
209
views
asked
Oct 1, 2020
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Mar 11
by
(user.guest)
selected
Mar 13
by
(user.guest)
Best answer
Yes this is valid. The minimum size for the TCP header data is 5 words is 20 bytes and the maximum size is 15 words which is 60 bytes.
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
1.3k
views
If a physical address is 48 bits (6 bytes) what is the minimum header size at the data link layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
2.0k
views
Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
2.1k
views
If a port number is 16 bits (2 bytes), what is the minimum header size at transport layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
6.0k
views
An Ethernet MAC sublayer receives 1510 bytes of data from the LLC layer. Can the data be encapsulated in one frame? If not, how many frames need to be sent? What is the size of the data in each frame?
asked
Sep 24, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
2.0k
views
If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
246
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
225
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
491
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
7.5k
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
115
views
Is it possible for TCP to send data-less packets on an established connection
asked
Apr 20
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
507
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.8k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
581
views
In one case a byte is defined as a sequence of 8 bits. Each bit can be either zero or one. How many different bytes are possible?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
790
views
Duplicate: Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system?
asked
Oct 19, 2020
in
Database Management Systems
by
anonymous
+2
votes
1
answer
10.0k
views
Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system?
asked
Mar 30, 2020
in
Database Management Systems
by
anonymous
0
votes
1
answer
7.1k
views
Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP datagram.
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.2k
views
Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not have a link?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.1k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.8k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.2k
views
Suppose two TCP connections are present over some bottleneck link of rate R bps. Both connections have a huge file to send (in the same direction over the bottleneck link).
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.5k
views
Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice’s certificate. In what step of the SSL handshake algorithm will Bob discover that he is not communicating with Alice?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.8k
views
True or false: Before an 802.11 station transmits a data frame, it must first send an RTS frame and receive a corresponding CTS frame.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
6.3k
views
Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+4
votes
1
answer
7.0k
views
How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
4.9k
views
Imagine the length of a 10Base5 cable is 2500 meters. If the speed of propagation in a thick coaxial cable is 200,000,000 meters/second, how long does it take for a bit to travel from the beginning to the end of the network?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
687
views
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet? (Hint: The answer we are looking for has nothing to do with TCP’s congestioncontrol mechanism.)
asked
Dec 11, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
2.5k
views
Is HFC transmission rate dedicated or shared among users? Are collisions possible in a downstream HFC channel? Why or why not?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.0k
views
Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA and ACK frames. Would there be any advantage to using the CTS and RTS frames? Why or why not
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.5k
views
Explain why it is difficult to validate a reusable component without the component source code. In what ways would a formal component specification simplify the problems of validation?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
929
views
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
697
views
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system.
asked
Nov 5, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
3.0k
views
Explain why it may be difficult to use agile methods in a large project to develop a new information system that is to be part of an organizational system of systems.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
3.0k
views
True or false? Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one half of its previous value.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.1k
views
Explain why it is important when writing secure systems to validate all user inputs to check that these have the expected format.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.9k
views
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
5.3k
views
List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.1k
views
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
632
views
Consider a traditional (stateless) packet filter. This packet filter may filter packets based on TCP flag bits as well as other header fields. True or False?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.4k
views
Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.3k
views
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
4.6k
views
Suppose you wanted to do a transaction from a remote client to a server as fast as possible. Would you use UDP or TCP? Why?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
241
views
3A.21.2H.1 IS VALID OR NOT
asked
Aug 14, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
468
views
Some of the most important pieces of data stored in the RAM are the instructions which basically tells the CPU what to do at a particular time. Explain the concept of Instruction Set in the CPU and how it works.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...