1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
15

A station running TCP/IP needs to transfer a file to a host. The file contains 2048 bytes. Assume a payload size of 512 bytes wo

uld be sent per packet and both systems are running IPv4. Also assume that the three-way handshake and window size negotiation have been completed and that no errors occur during transmission. a. What is the protocol overhead
Computers and Technology
1 answer:
VladimirAG [237]3 years ago
3 0

Answer:

The percentage/protocol overheads is about 7.8125 %

Explanation:

Solution

Recall that the TCP header contains a  20 bytes and IP header also contains  20 bytes.

The total of the overhead now is 40 bytes

Now,

let 2048 bytes be  divided by 4 segments

Thus, it becomes  (40+512) *4 = 2208

Therefore  2208 byes are sent by only 4 segments.

Now what is the overhead protocol

(1)  Since 2048 = 100%

let 2208 be  = X%

Then,

X=2208 * 100/2048 = 107.8125, that is from 100 % increased the 7.8125

therefore. the percentage overheads is about 7.8125 %

You might be interested in
In Shoreville, the last low tide was at 12:00 a.m. About what time will the next high tide occur?
Oliga [24]
6 pm they happen every 12 hours

4 0
3 years ago
Read 2 more answers
What information is displayed in the message header of a received message? Check all that apply.
Nesterboy [21]
The answers are:


-the message subject
-the name of the sender
-the names of recipients
-the time and date the message was sent
8 0
3 years ago
Read 2 more answers
Crop marks are used on an illustration to indicate to the printer the
Advocard [28]
Crop marks are used on an illustration to indicate to the printer the A. center point of the illustration. Hope this helped!.
5 0
4 years ago
What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
TEA [102]
D because at the same time it might be long


4 0
3 years ago
Read 2 more answers
You are embedding a video in your Webpage. What three formats should you specify in the source
Bogdan [553]

Answer:

d

Explanation:

3 0
3 years ago
Other questions:
  • A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by
    14·1 answer
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • To put out a minor engine fire, use
    12·1 answer
  • : how do network effects help facebook fend off smaller social-networking rivals?
    7·1 answer
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    13·2 answers
  • Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
    5·1 answer
  • Discuss the causes ,symptoms, preventive measures and treatment of AIDS​
    6·2 answers
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • HELP ME PLEASE
    8·1 answer
  • When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!