1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
3 years ago
8

Assume TCP is operating in steady state congestion avoidance phase (no slow start) and the maximum congestion window size is 220

KB (220*8 Kbits), RTT is 150 ms. What is the average TCP throughput?
Computers and Technology
1 answer:
lianna [129]3 years ago
6 0

The maximum possible TCP throughput is 12.01 Mbps.

<u>Explanation:</u>

TCP is a protocol offered by the transport layer and for data to be transferred by TCP, the two factors that TCP depends upon are the congestion window size and the RTT. The TCP throughput is calculated by this formula:   TCP throughput = Window size/ the RTT.

Now,

Congestion window size = 220 KB

= 220 \times 1024 bytes

= 225280 bytes

= 225280 \times 8 bits

= 1802240 bits.

Here, we have to convert the window size into bits so as to facilitate easier calculation.

RTT= 150 ms (milliseconds) = 150 \times 10^-^3 s = 0.15 s

We come to know that the RTT is 0.15 s.

Now, TCP throughput = Window size (In bits)/RTT

=\frac{1802240}{0.15}

= 12014933.33 bits/sec

= 12.01 Mbps

Therefore, the maximum possible TCP throughput is 12.01 Mbps.

You might be interested in
MOA X_WIU VUI } } } Which of the following is a true statement about the behavior of WordClass objects? ​
Ronch [10]

Answer:

MOA X_WIU VUI } } } Which of the following is a true statement about the behavior of WordClass objects?

7 0
3 years ago
Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end securit
KatRina [158]

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

7 0
3 years ago
What key do you press so you can switch tabs quickly?
ss7ja [257]
Alt and tab to switch to open applications
4 0
4 years ago
Classify the following skills : communication, creativity , and independence.
trasher [3.6K]

The answer is B. I would search it up and read carefully. The answer I choose I look up the definition.

here is the answer I found

The Interpersonal Skills workshop will help participants work towards being that unforgettable person by providing communication skills, negotiation techniques, tips on making an impact, and advice on networking and starting conversations. They will also identify the skills needed in starting a conversation, moving a conversation along, and progressing to higher levels of conversation.

7 0
4 years ago
1. Which of the following would be the most appropriate way to invoke the CalculateAvg( ) method found in the Student class if a
ICE Princess25 [194]

Answer:

The correct answer to the following questions is:

1.) Option e.) answer = gradStudent.CalculateAvg(87.2, 90);

6.) Option a.) ToString( ).

2.) Option d.) data, behavior.

3.) Option c.) int CalculateAvg(double val1, double val2).

Explanation:

There are two types of methods in every programming language.

1. User-defined methods -These methods are those which is defined by the user and these methods where the user wants.

2. Built-in methods - These methods are those which are already defined in these language. Only users can call these methods.

Overloaded method - These functions are those functions which have the same name but different in the argument list.

6 0
3 years ago
Other questions:
  • Write a program to prepare the monthly charge account statement for a customer of CS CARD International, a credit card company.
    11·1 answer
  • The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class
    9·1 answer
  • If a person was on board a hypersonic airplane what do you think they would be able to see as they look out a window looking in
    13·2 answers
  • Write a program that reads in investment amount, annual interest rate, and number of years, and displays the future investment v
    5·1 answer
  • Pick the JavaScript code for the following pseudocode. If age &gt;= 65 Then discountRate = 0.10 End If Group of answer choices
    12·1 answer
  • "explain why professional software is not just the programs that are developed for a customer"
    7·1 answer
  • Which statement describes a printer driver? a) It is the configuration code that is sent to a printer to identify the operating
    5·1 answer
  • What is the correct syntax to take the first five characters from the cell and place to its right in cell A3?
    15·1 answer
  • Look at (d), is it accurate? ​
    9·2 answers
  • <img src="https://tex.z-dn.net/?f=%28a%20%2B%20b%29%20%20%7B2%7D" id="TexFormula1" title="(a + b) {2}" alt="(a + b) {2}" align
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!