1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
10

In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you

think the TCP designer chose not to perform a fast retransmit after the first duplicate ACK for a segment is received?
Computers and Technology
1 answer:
Klio2033 [76]3 years ago
3 0

Answer:

Packets can arrive out of order from the Internet Protocal layer. So,

when out-of-order packets with higher-than-expected sequence number arrives, then gap is detected.

Receiver of an out of order packet would then generate and sends a duplicate acknowledgement (ACK) for already received packet. If retransmission is performed after the first duplicate ACK, it would lead the sender to introduced too many redundant packets in the network.

Hence, TCP designer chose to wait for third acknowledgement (ACK) instead of performing a fast retransmission to avoid redundant packet transmission.

You might be interested in
Which type of boot authentciation is more secure?
xeze [42]
The correct answer would b (C) because all the other ones are not on the list
7 0
3 years ago
Abdhbhbhsbfhsbhcvdhcbsdbhsvhgvhdsgvfhsgdvfhgdsvghcghvc
Orlov [11]

Answer:

thats what i like daddy

ohhhh

Explanation:

6 0
4 years ago
Read 2 more answers
There are many different computer peripherals that are available to optimize your computing system’s specific needs. A graphic d
Rashid [163]

Answer:

Jamal could use a drawing pad. He could draw things out with a stylus and have it on his PC to manipulate. They cost as little as $40.

Felicia could use a mechanical keyboard. Although these are better for nearly everyone, someone who is doing a lot of typing and needing both speed and accuracy should get one. They start at around $50.

Credence could use a printer to print out work to hand in when needed. A decent one starts at around $100.

8 0
3 years ago
What built-in function should you use in python to prompt a user for data input?
stiks02 [169]

The built-in function you use in python to prompt a user for data input is the input function.

<h3>What is an input function?</h3>

An input function is a function used to prompt a user for data input.

The data input may be a string, integer, float, and many more.

Let's use an example of an input function in python.

x = input("what is your name: ")

y = int(input("How old are you: "))

Hence, the first input will prompt the user for the name and the second input will ask the user for his age. It can only accept integers.

learn more on input function here: brainly.com/question/17623507

#SPJ12

5 0
2 years ago
Read 2 more answers
Protocol 2 - Check for Errors
Lapatulllka [165]

Please note that the Problem to be solved from Protocol 1 is not provided hence the general answers. To construct and send, open a network environment a single multi-packet message, simply click "Add Packet" and then click "Send at Once".

<h3>How will the receiver know the order of the packets or if any are missing?</h3>

If the text or message sent does not make any reading sense, or if certain words are jumbled and out of place, then it is clear that something is wrong.

If the messages arrive in a coherent fashion, then the packet was fully received.

<h3>How will the receiver request missed packets and what will the sender do in response?</h3>

Where the users are familiar with the Transmission Control Protocol, lost packets can be detected when there is a timeout. Lost packets are referred to as Dropped packets.

Learn more about Packets at:
brainly.com/question/17777733

7 0
2 years ago
Other questions:
  • When creating databases, the different pieces of information are input into _______.
    7·1 answer
  • List three components of a computer system​
    10·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    7·1 answer
  • What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?
    7·1 answer
  • _______ view is used to size field names and controls and to apply formats.
    10·2 answers
  • In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____
    13·1 answer
  • Class function which is called automatically as soon as the object is created is called as __
    6·1 answer
  • In the following nested loop structure, which loop does the program EXIT first?
    6·1 answer
  • 1 point
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!