In transport layer, for connection oriented communication
Three way handshake process is there to establish a
connection. So question is that, when a host send an ACK
messages to another host with host intend to establish a
connection, the source host send it as Broadcast or unicast
message? Cud anyone explain this.
Thanks in advance.
Answers were Sorted based on User's Feedback
Answer / jitendera kumar sinha
procedure for 3ree way handshake protocol
Host A sends a TCP SYNchronize packet to Host B with sequance number x and tpdu
Host B receives A's SYN.and reply with its own sequnave nuber that is y.
Host B sends a SYNchronize-ACKnowledgement
Host A receives B's SYN-ACK
to establish a conection a client execute a connect primitive specifying the ip address and the port to which it want to connect.
thus from overall discussion we can say that the to establish connetion via 3reeeway host execute unicast message.
please mark if i wrong or right.your feddback i important to me
thanks
jitendera kumar sinha
Host A sends ACKnowledge
Host B receives ACK. TCP connection is ESTABLISHED.
from this it is look like a unicast msg.is not it.3ree way hand shake usage tcp not udp.so answer should be unicast.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / mr.shahin07
Mr. Jitendera, Ur concept is little bit wrong. Three way
handshake process is lyk dis -
we assume a client computer is contacting a server to send
it some information.
1. The client sends a packet with the SYN bit set and a
sequence number of N.
2. The server sends a packet with an ACK number of N+1,
the SYN bit set and a sequence number of X.
3. The client sends a packet with an ACK number of X+1
and the connection is established.
4. The client sends the data.
Watever i think, It wud be UNICAST communication.
U Cn check this video also...
http://www.youtube.com/watch?v=z40w3G8szK0
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jitendera kumar sinha
thank you very much for correction in my consept in
handshake 3ree way.by the way what is the exect answer of
that question.our answer are based upon theorytical concepts
so it might be wrong or wright.i have asked some of my
senior about that they told me it is unicast but they are
also not confirmed so i want to know exect answer.becoz on
yours explanation it is looking that you are also not sure
by the way thank you very much
jitenera kumar sinha
| Is This Answer Correct ? | 2 Yes | 0 No |
What is the default routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) Bandwidth and delay D.) Hop count
When we use interface mode?
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
How many parts of ping?
what is the difference between a passive and active hub?? which is better ??
What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification
As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP
Hi, Can any one please tell me the experience of their CCNA interview,and please tell me all the questions they asked in the interview. Many Thanks...
Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF
What is the purpose of data link layer?
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.