Sign In
Ask Question
Escobar
Computers & Technology
Imagine a TCP session over wireless where the congestion window is fixed at 5 segments (congestion control is turned off and no fast retransmits). Segments may get lost but are not reordered. The receiver has an infinite buffer and it sends an acknowledgment as soon as it receives a segment, i. e., acknowledgments are not deferred. Similarly, the sender transmits a segment as soon as it is allowed to. Each segment carries 1000 bytes and the time to transmit a segment is 2 ms. Assume that transmission of ACK takes negligible time. Note that the retransmission timer for a segment is started after the last bit of the segment is sent. Assume Go-Back-5, and accumulative ACK is used.
Suppose two data segments with byte sequence numbers 3000 and 15000 are lost once during the transmission. How many segments get retransmitted under each of the following conditions?
A. Round trip time = 100 ms, Timeout = 101 ms
B. Round trip time = 100 ms, Timeout = 152 ms
Answer
Answers (1)
Xzavier Roth
Computers & Technology
Which windows tools would you use to browse the files system on a hard drive?
Answer
Answers (1)
Kyson Houston
Computers & Technology
Write the definition of a function printLarger, which has two int parameters and returns nothing. The function prints the larger value of the two parameters on a single line by itself. (For purposes of this exercise, the "larger" means "not the smaller".)
Answer
Answers (1)
Coke Zero
Computers & Technology
What is the sub-domain/domain name used to locate Web sites?
Concurrent Versions System
Universal Modeling Language
Input Processing Output
Uniform Resource Locator
Answer
Answers (1)
Maeve Gaines
Computers & Technology
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Answer
Answers (1)
Guest
Computers & Technology
Is the AMD A12 processer better that the intel i7?
Answer
Answers (1)
Arianna Kerr
Computers & Technology
a toy company has released a new toe that is a huge hit. they are liiking at different packing companies, so that their toy can be shipped quickly and arrive in good condition. perfect packing and send-a-lot packing each can pack up to 8 hours per day.
Answer
Answers (1)
Ann Mcfarland
Computers & Technology
Write the function prototype for a function called showSquare. The function should have a single parameter variable of the int data type and a return type of void.
Answer
Answers (1)
Vaughan
Computers & Technology
When an online company runs a special promotion on swimsuits during the summer, they are taking advantage of the concept of
Answer
Answers (1)
Amina Chen
Computers & Technology
Which description below best describes the purpose of computer firewalls?
They check the behavior of the packet and do not allow anything into the network.
They do not allow anything in the network and do not check a packet's credentials.
They watch the incoming packet and do not allow anything into the network.
They check the incoming packet's credentials and behavior of the packet.
Answer
Answers (1)
Gerald Knapp
Computers & Technology
What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to disclose sensitive information or click on a link?
Answer
Answers (1)
Guest
Computers & Technology
After clicking the start button on your computer screen desktop what option would you then select to examine system components you might want to modify?
Answer
Answers (1)
Emerson Newman
Computers & Technology
What does system. out. printIn () do in Java?
Answer
Answers (1)
Isaiah Berger
Computers & Technology
What is the function of the subnet address for each of the classes?
Answer
Answers (1)
Maritza Fernandez
Computers & Technology
A confidential number used as an authentication factor to verify a user's identity is called a:
a, PIN
b. User ID
c. Password
d. Challenge
Answer
Answers (1)
More
1
...
184
185
186
187
188
...
Home
»
Computers & Technology
» Page 186
Sign In
Sign Up
Forgot Password?