1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
11

Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha

t 5 consecutive data segments and their corresponding ACKs can be received (if not lost in the channel) by the receiving host (Host B) and the sending host (Host A) respectively. Suppose Host A sends 5 data segments to Host B, and the 2nd segment (sent from A) is lost. In the end, all 5 data segments have been cor- rectly received by Host B.
Computers and Technology
1 answer:
kvv77 [185]3 years ago
6 0

Answer:

a. GoBackN:

A sends 9 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later  re-sent segments 2, 3, 4, and 5. B sends 8 ACKs. They are 4 ACKS with sequence  number 1, and 4 ACKS with sequence numbers 2, 3, 4, and 5.

Selective Repeat:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later  re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 1,  3, 4, 5. And there is one ACK with sequence number 2.

TCP:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 2.  There is one ACK with sequence numbers 6. Note that TCP always send an ACK  with expected sequence number.  

TCP successfully delivers all five data segments in shortest  time interval. This is because TCP uses fast retransmit without waiting until time out.

Explanation:

You might be interested in
Which three decisions might a specialized drone delivering medical supplies make once it's algorithm has started and it is scann
densk [106]

The decisions that a specialized drone delivering medical supplies make once it's algorithm has started and it is scanning its surround are:

  • A  tilt backyard when sensor detects an obstacle within 10 feet.
  • To disable self flying and alert pilot when sensor detects an obstacle within 3 feet.
  • To resume normal speed when sensor doesn't detect an obstacle within two feet.

<h3>How are drones used in healthcare?</h3>

Hospitals are known to have started  using drones to transport laboratory samples and also to carry out other kinds of humanitarian aids.

The use of  drones  is said to be one that is cost-effective and it is one that bring blood products, vaccines, medical supplies, and others to rural areas or areas that has small infrastructure.

A drone can find way to move around obstacles but they should not shut down where there is obstacle.

Learn more about drone from

brainly.com/question/24530012

5 0
3 years ago
List the three control problems associated with competingprocesses and briefly define each.
hjlf

Answer and explanation :

the three control problems associated with competing process are

  • MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
  • DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
  • STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing  then low priorities process have to wait for very long time this is called starvation
3 0
3 years ago
Which of the following is the core communications protocol for the internet? telnet ftp tcp/ip ssl
inna [77]
Tcp/ip is the core communication protocol for the internet
4 0
3 years ago
There are two main types of hard drive available to a computer. State what they are and describe their use.
Gala2k [10]

Answer:

Hard disk drives (HDD), which use one or more rotating discs and rely on magnetic storage, and solid-state drives (SSD), which have no moving mechanical parts, but use flash memory like the kind found in USB flash drives.

Explanation:

6 0
2 years ago
What data type or you use to represent true or false values?
vfiekz [6]
The Boolean type is used to represent true or false values
3 0
2 years ago
Other questions:
  • Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a
    12·1 answer
  • Calls to the tostring( ) method emphasize the use of ____.
    12·1 answer
  • Why might location be important when searching for a job?
    10·2 answers
  • What would happen if a pc that contains a power supply that does not automatically adjust for input voltage is set to 230 volts
    13·1 answer
  • Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
    7·1 answer
  • PLEASE HELP ME ASAP!!!!
    11·1 answer
  • Select the true statement from the choices below. Group of answer choices Invalid code may cause browsers to render the pages sl
    11·1 answer
  • ECG mashine is an example of
    12·1 answer
  • Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • What tab appears that allows for charts to be formatted when a chart is selected?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!