1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
15

"what are the problems with tcp over wireless network?"

Computers and Technology
1 answer:
Murrr4er [49]3 years ago
8 0

The TCP protocol treats bit errors as congestion problems, which leads to a sub-optimal error correction. Wireless networks have a much higher bit error rate than wired ones, and the TCP protocol is not optimized for that.

You might be interested in
What is a functionalist perspective of cell phones, internet and personal computers?
Sedbober [7]
<span>As these technologies are rapidly evolving a functionalist would say that they unbalance the equilibrium of the social state, and is therefore undesirable as there is more interaction and adaptation of habits from other societies. But they also say that it's not a good thing to change immediately because it might disrupt the society. Therefore it has to change slowly. </span>
3 0
3 years ago
What’s unique about New Cashierless stores?
Anettt [7]
There’s no cashiers, meaning if you need help you got to figure it out alone.
7 0
2 years ago
ASAP help me I dont have enough time
umka21 [38]

Answer:third stage of parent-infant attachment

Explanation:

7 0
1 year ago
​Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you
yuradex [85]

Answer: Authentication factor

Explanation: Authentication factor are the factors that describes about the ingenuity or originality of the user .This is the term that tells about the actuality of user that is getting connected with network by the five elemental question .

The question is regarding the possession, inherency, knowledge/information , identity and location.The answers to these question help in finding the authenticated user.

6 0
3 years ago
Read 2 more answers
What is the clearing house for domain names called?
denpristay [2]
Trademark cleaning house?
8 0
3 years ago
Other questions:
  • If you have 5 bits, how high can you go in binary?
    15·1 answer
  • To remove an embedded chart, you should _____ it and press the DELETE key.
    14·2 answers
  • Sam wants to move from his current role in his organization to a managerial role. Which certification will help him get on a man
    6·1 answer
  • What color does Sam obtain when he mixes white with a color? Sam is painting a landscape and needs to paint the sky light blue.
    9·2 answers
  • A. True
    8·1 answer
  • Find the mistakes in the following code. Not all lines contain mistakes. Each line depends on the lines preceding it. Watch out
    14·1 answer
  • What is gender bias?
    9·1 answer
  • Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when _____.
    9·1 answer
  • How should you mark the query if it is a valid one?
    9·1 answer
  • Lori Redford, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!