1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio [31]
3 years ago
11

Consider a channel that can lose packets but has a maximum delay that is known. Modify Protocol rdt2.1 to include sender timeout

and re-transmission. Informally argue why your revised protocol can communicate correctly over this channel

Computers and Technology
1 answer:
Bogdan [553]3 years ago
8 0

Answer:

See attached picture.

Explanation:

As the packets are being lost, so the introduction of re-transmission and timeout are used to identify the lost packets and re-transmit them. So, the revised protocol can communicate correctly over this channel.

You might be interested in
What is the wave speed of a wave that has a frequency of 100 Hz and a wavelength of 0.30m?
swat32

<u><em>Answer:</em></u>

<u><em>The speed is  </em></u>

<u><em>= </em></u>

<u><em>30 </em></u>

<u><em>m </em></u>

<u><em>s </em></u>

<u><em>− </em></u>

<u><em>1 </em></u>

<u><em> </em></u>

<u><em>Explanation: </em></u>

<u><em>The speed of a wave is given by </em></u>

<u><em> </em></u>

<u><em>speed </em></u>

<u><em>( </em></u>

<u><em>m </em></u>

<u><em>s </em></u>

<u><em>− </em></u>

<u><em>1 </em></u>

<u><em>) </em></u>

<u><em>= </em></u>

<u><em>frequency(Hz) </em></u>

<u><em>× </em></u>

<u><em>wavelength (m) </em></u>

<u><em> </em></u>

<u><em>The frequency is  </em></u>

<u><em>f </em></u>

<u><em>= </em></u>

<u><em>100 </em></u>

<u><em>H </em></u>

<u><em>z </em></u>

<u><em> </em></u>

<u><em>The wavelength is  </em></u>

<u><em>λ </em></u>

<u><em>= </em></u>

<u><em>0.3 </em></u>

<u><em>m </em></u>

<u><em> </em></u>

<u><em>The speed is </em></u>

<u><em> </em></u>

<u><em>v </em></u>

<u><em>= </em></u>

<u><em>λ </em></u>

<u><em>f </em></u>

<u><em>= </em></u>

<u><em>0.3 </em></u>

<u><em>⋅ </em></u>

<u><em>100 </em></u>

<u><em>= </em></u>

<u><em>30 </em></u>

<u><em>m </em></u>

<u><em>s </em></u>

<u><em>− </em></u>

<u><em>1 </em></u>

<u><em> </em></u>

<u><em></em></u>

<u><em></em></u>

<u><em></em></u>

6 0
3 years ago
Can anybody answer this
shutvik [7]

Answer:

Its the last one, CSS and HTML are similar but like it says some prefer one over the other.

6 0
3 years ago
Read 2 more answers
You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t
babymother [125]

Answer:

The blocking system.

Explanation:

In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.

For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.

By this way, there won´t be any duplicated actions or reponses.

5 0
4 years ago
Rock, Paper, Scissors is a two-player game in which each player chooses one of three items. If both players choose the same item
mezya [45]

Answer:

The answer is c

Explanation:

7 0
3 years ago
Plz help code practice for python
laila [671]

Answer:umm

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
    8·1 answer
  • The programs that provide the infrastructure and hardware control necessary for the computer and its peripheral devices are call
    11·1 answer
  • If you want to use your computer for recording your band, you would benefit most from a(n)
    13·2 answers
  • What is a flash player?
    9·2 answers
  • Identify the sampling technique used:A lobbyist for a major airspace firm assigns a number to each legislator and then uses a co
    13·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • With respect to computer networks, organizations often install a dedicated telephone system called a ________ to route external
    8·1 answer
  • Why does this website have so many copies of plagiarism?
    5·1 answer
  • Create a file using any word processing program or text editor. Write an application that displays the files, name, containing f
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!