1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
11

Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha

t 5 consecutive data segments and their corresponding ACKs can be received (if not lost in the channel) by the receiving host (Host B) and the sending host (Host A) respectively. Suppose Host A sends 5 data segments to Host B, and the 2nd segment (sent from A) is lost. In the end, all 5 data segments have been cor- rectly received by Host B.
Computers and Technology
1 answer:
kvv77 [185]3 years ago
6 0

Answer:

a. GoBackN:

A sends 9 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later  re-sent segments 2, 3, 4, and 5. B sends 8 ACKs. They are 4 ACKS with sequence  number 1, and 4 ACKS with sequence numbers 2, 3, 4, and 5.

Selective Repeat:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later  re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 1,  3, 4, 5. And there is one ACK with sequence number 2.

TCP:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 2.  There is one ACK with sequence numbers 6. Note that TCP always send an ACK  with expected sequence number.  

TCP successfully delivers all five data segments in shortest  time interval. This is because TCP uses fast retransmit without waiting until time out.

Explanation:

You might be interested in
What is the major difference between the intranet and extranet?
slega [8]

Explanation:

Iinternet is hudge graphicla network and intranet is small network as compare to internet

8 0
2 years ago
Which type of password would be considered secure
max2010maxim [7]
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
5 0
3 years ago
Read 2 more answers
Which of the following is NOT a Boolean Search term used to refine search engine results? A. AND B. With C. OR D. NOT
den301095 [7]
B. With. Width isn't a boolean comparative operator
7 0
3 years ago
Read 2 more answers
8.1.4: Ghost Invasion!
Natalija [7]

the fat car has a lot to pass on PC Dell is the only thing to

8 0
2 years ago
Which does plug-and-play refer to?
vlabodo [156]
The answer is c the ability for the os to detect
7 0
2 years ago
Other questions:
  • Can someone fix this so that it only says "its a payday" on 15 and 30 and on all other days "sorry, it's not payday"
    9·1 answer
  • A __engineer specializes in computer hardware design and integration.
    15·1 answer
  • Refers to the programs or instructions used to tell the computer hardware what to do.
    8·1 answer
  • Summarizes statistical data ?
    11·1 answer
  • Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploa
    12·2 answers
  • Why computer process faster than humans?​
    10·2 answers
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • Why is it so important to have employees who can critically think?
    7·2 answers
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!