1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
4 years ago
8

Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; th

e second has sequence number 110.
a. How much data is in the first segment?

b. Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B sends to Host A, what will be the acknowledgment number?
Computers and Technology
2 answers:
Anna71 [15]4 years ago
8 0

Answer:

a)   Consider sequence numbers,First segment=90

Second segment=110

Data in the first segment = 110-90  =20

b) Consider the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B sends to Host A, then the acknowledgment number will be first segment of sequence number, that is 90.

Explanation:

KonstantinChe [14]4 years ago
7 0

Answer:

(a) 20 bytes

(b)90

Explanation:

a. 20 bytes.

110-90= 20 Bytes

Bytes From 90-109 are in the first segment.

b. 90.

TCP uses cumulative acknowledgments, so even if it buffers the second segment, the acknowledgment is still for the first segment.

You might be interested in
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Banks and other financial service companies offer many types of accounts for client's to invest their fund-- every one of them h
monitta

Answer:

//Abstract class declaration of Account

public abstract class Account{

   

   //nextId initialized to 10001

   private static int nextId = 10001;

   private int id;

   private String name;

   // constructor with one argument

   public Account(String passName){

       name = passName;

       //assign the value of nextId to id

       id = nextId;

       //nextId is incremented

       nextId++;

   }

   // accessor method to return id

   public int getId(){

       return id;

   }

   // accessor method to return name

   public String getName(){

       return name;

   }

   //abstract method that return object of type Cash

   //It is not implemented here.

   //It will be overriden and implemented by concrete subclassed

   public abstract Cash getValue();

}

Explanation:

The abstract class Account is defined with the keyword abstract. Then inside the class, we declared and initialized an integer static variable nextId, an instance variable id and a String instance variable name.

A constructor is then defined which accept one argument of a string passName.

Two accessor methods getId and getName are declared. getId return an integer id, while getName return a string name.

Finally, an abstract method getValue is declared with no implementation and it return an object of type Cash.

6 0
4 years ago
Plz answer it’s timed
MAVERICK [17]

Answer: the third one

Explanation:

just trust me, the other ones dont mke sense to what I know about the subject, which is a lot

7 0
3 years ago
An Identity Theft Report is a combination of a police report and a report submitted to which of the following organizations
DENIUS [597]
Nut Busting Orgainazation
7 0
4 years ago
How can the internet provide entertainment for students​
zysi [14]

Answer:

It can show them something educational while showing something entertaining at the same time.

Explanation:

6 0
3 years ago
Other questions:
  • In these ones all your finding is the mean(average).
    14·1 answer
  • Identify the subject: Computer graphics are amazing these days.
    6·2 answers
  • What is labor and how does it relate to automobile!!!! NEED HELP PLEASEE
    13·1 answer
  • Which of the following is a windows feature that allows you to temporanily store text
    8·2 answers
  • A method that movie distributors are adopting to make it possible to view movies instantly, without DVD, is known as:
    11·1 answer
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • What is modularity? Help asap
    9·1 answer
  • What is an OS? Explain the objectives of an OS.​
    11·1 answer
  • ANSWER ASAP! 50 POINTS!!!!
    10·2 answers
  • Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produc
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!