1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
14

If a voice call has missing data it makes it hard to understand the speaker. Therefore, we commonly allow time for a limited num

ber of retransmissions before playing the sound to the listener. If the network path (in each direction) has total packetization delay of 15ms, total propagation delay of 25ms, and queuing delay varying between 0ms and 10ms, how large (in milliseconds) does the playback buffer need to be if we want to allow for one retransmission?
Computers and Technology
1 answer:
Rudik [331]3 years ago
5 0

Answer:

There will be a playback buffer of 100ms due to re-transmission.

Explanation:

Video and audio packets needs to be reliable in a network, so a connection oriented protocol like TCP (transmission control protocol) is always configured for this case.

Delays in the transmission of packets can be noticeable with regards to videos and audios and they can be calculated and configured when necessary.

In this scenario, there is a re-transmission of a dropped packet, so it is not acknowledged by the receiver. An ICMP message is sent to the source with a delay of;

total delay to source: packetization delay + propagation delay + queuing delay

                                =   15ms +  25ms  +  10ms      = 50ms

Re-transmitting to the receiver, in equal condition, takes the same amount of time

        Total delay after re-transmission = 2 × 50   = 100ms.

So the maximum delay is 100ms

You might be interested in
If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
USPshnik [31]

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

6 0
4 years ago
These operating systems were referred to as command-based. A.Android and MS-DOS B.iOS and Windows C.LINUX and UNIX D.MS-DOS and
jolli1 [7]

Answer:

D.MS-DOS and UNIX

Explanation:

The oldest versions of Windows Operating Systems used MS-DOS. MS-DOS was purely command-line based OS. MS-DOS did not have GUI and users were required to learn command lines to help them navigate through, open, and manipulate files. MS-DOS is no longer used. UNIX was also a command-line based operating system when it was initially built in the 1960s. It still is but it supports both GUI and CLI. Unix, in my opinion, is hands down the best and most powerful CLI based OS to have ever been built.

5 0
3 years ago
Read 2 more answers
2. When a process is "listed" in a queue, what information is actually stored in the list in memory?
Arte-miy333 [17]

Answer:

When a process is "listed" in a queue, the most important information stored in the list in memory are;

i. Process state: The process state is the status of a given process at a given point in time. In this case, the process state of the process in a queue is going to be <em>waiting</em>.

ii. Process ID: Every process has a unique identifier to distinguish it from other processes.

iii. Priority status: This gives the information of the priority level of the process over other processes that are listed in the queue.

6 0
3 years ago
Create a function named CountVowels() that takes one parameter name epsilon
LenaWriter [7]

def CountVowels(epsilon):

   countNum = 0

   for x in range(len(epsilon)):

       letter = epsilon[x]

       if letter.lower() in "aeiou":

           countNum += 1

   return countNum

def ExtractOdds(zeta):

   result = ""

   for x in range(len(zeta)):

       if x % 2 == 1:

           result += zeta[x]

   return result

sentence_A = input("Enter a sentence: ")

sentence_B = input("Enter a sentence: ")

print(CountVowels(sentence_A))

print(ExtractOdds(sentence_B))

I hope this helps!

5 0
3 years ago
Angelika just submitted her product for the first time, and she had 2 errors, 3 warnings, and 5 notifications. What does she nee
skelet666 [1.2K]

vvhooi. cucuxcuh gxzuzn

5 0
4 years ago
Read 2 more answers
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • What e-reader technology males a screen that is easy to read and extends battery life
    6·1 answer
  • what is it called when you are biying and selling products via electronic channels such as the internet​
    13·2 answers
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • Which computer specifications would be best suited for the following scenario? The marketing department wants to buy two new com
    14·1 answer
  • What general strategies can the network managers use to reduce congestions?
    7·1 answer
  • You want to verify whether a PTR record exists for the Serv2.csmpub.local host, but you don't know the IP address. Which of the
    8·1 answer
  • Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string,
    9·1 answer
  • Logistic Regression is a type of __________ problem.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!