1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
14

In the Stop-and-Wait flow-control protocol, what best describes the sender’s (S) and receiver’s (R) respective window sizes?

Computers and Technology
1 answer:
kolbaska11 [484]3 years ago
3 0

Answer:

The answer is "For the stop and wait the value of S and R is equal to 1".

Explanation:

  • As we know that, the SR protocol is also known as the automatic repeat request (ARQ), this process allows the sender to sends a series of frames with window size, without waiting for the particular ACK of the recipient including with Go-Back-N ARQ.  
  • This process is  mainly used in the data link layer, which uses the sliding window method for the reliable provisioning of data frames, that's why for the SR protocol the value of S =R and S> 1.
You might be interested in
What is are motor vehicle emissions?
saul85 [17]

Exhaust gas or flue gas is emitted as a result of the combustion of fuels such as natural gas, gasoline, petrol, biodiesel blends, diesel fuel, fuel oil, or coal. It's pretty much exhaust gas.

7 0
3 years ago
Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
Serggg [28]

Answer: (D)DoS attack.

Explanation:

Denial of Service attack occurs when an hacker prevents the real users from accessing the service by sending excessive message to the server asking it to authenticate requests with invalid return address.

7 0
3 years ago
The purpose of an interface is to:___________
Galina-37 [17]

Answer:

Purpose of the interface

Provides communication − One of the uses of the interface is to provide communication. Through interface you can specify how you want the methods and fields of a particular type.Jul

8 0
3 years ago
If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should
aleksley [76]

There are different kinds of installations of system software. If you wish to install a new OS, the type of boot setup that one should create a dual.

A dual boot, or multiboot when used, allows one to be able to install a new OS without hindering the activity of the old one, so that one can boot to either OS.

Multi-booting is simply known as the process whereby a person installs multiple operating systems on a single computer, and being able to choose which one to boot.

Dual-booting is a very common configuration that is known to all. It pertains to two operating systems.  

See full question below

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?

dual

cross

controlled

Learn more about dual boot from

brainly.com/question/13483046

7 0
2 years ago
Digital signatures are as legally acceptable as written signatures.
Leto [7]

Answer:

First point and the last point are the correct answer to the given question .

Explanation:

The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.

Following are the advantages of the digital signature

  • As compare to the electronic signature the digital signature is more secure then that of.
  • The signer's signature is seen on the digital signatures as the physical proof.
  • Global recognition, and the compliance with the law.

All the other options are incorrect they are not advantage of the digital signature .

4 0
3 years ago
Other questions:
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • Write a function getPigLatin(pigStr) that accepts pigStr as a parameter (a sentence as input) and converts each word to "Pig Lat
    8·1 answer
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • Which method deletes a footer from a document?
    13·2 answers
  • Company XYZ has a new employee named John Anderson. His employee ID is XYZ1234. His email address will be <a href="/cdn-cgi/l/em
    10·1 answer
  • You are planning trip to South America and and are worried about your devices with private keys being stolen. So you decide to s
    9·1 answer
  • All computer systems have
    14·2 answers
  • Guess The Song:
    9·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • Explain the following terms <br><br>copyleft:<br><br>creative Commons:<br><br>GNU/GPL:​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!