1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
4 years ago
14

Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the

negotiated window size is 1000 bytes. The sender receives an ACK 1200 from the receiver.
Requried:
a. Which bytes will be sent next?
b. What is the last byte number that can be sent without an ACK being sent by the receiver?
Computers and Technology
1 answer:
weeeeeb [17]4 years ago
6 0

Answer:

a. 2100

b. 2199

Explanation:

GIven that:

The file size = 1000 MB

The  payload size is  = 100 bytes

The negotiated window size is = 1000 bytes.

This implies that the sliding window can accommodate maximum number of 10 packets

The sender receives an ACK 1200 from the receiver.

Total byte of the file is :

1000 MB = 1024000000 bytes

a.

Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged

=1200 + 9 * 100

= 1200 +  900

= 2100

b. What is the last byte number that can be sent without an ACK being sent by the receiver?

b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.

Thus; the last byte number send is :

= 1200 + 10 *100 -1

= 1200 + 1000-1

= 1200 + 999

= 2199

You might be interested in
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Extended essay on globalization not less than 200​
Serggg [28]

Answer:

First of all, people have been trading goods since civilization began. In the 1st century BC, there was the transportation of goods from China to Europe. The goods transportation took place along the Silk Road. The Silk Road route was very long in distance. This was a remarkable development in the history of Globalization. This is because, for the first time ever, goods were sold across continents.

Globalization kept on growing gradually since 1st BC. Another significant development took place in the 7th century AD. This was the time when the religion of Islam spread. Most noteworthy, Arab merchants led to a rapid expansion of international trade. By the 9th century, there was the domination of Muslim traders on international trade. Furthermore, the focus of trade at this time was spices.

True Global trade began in the Age of Discovery in the 15th century. The Eastern and Western continents were connected by European merchants. There was the discovery of America in this period. Consequently, global trade reached America from Europe.

From the 19th century, there was a domination of Great Britain all over the world. There was a rapid spread of international trade. The British developed powerful ships and trains. Consequently, the speed of transportation greatly increased. The rate of production of goods also significantly increased. Communication also got faster which was better for Global trade.

Finally, in 20th and 21st -Century Globalization took its ultimate form. Above all, the development of technology and the internet took place. This was a massive aid for Globalization. Hence, E-commerce plays a huge role in Globalization.

5 0
3 years ago
Write a C# solution for the following problem. Submit your .cs file to this link. Sample output(s) attached. == Create an Employ
harkovskaia [24]

Answer:

See attached file for detailed solution.

Explanation:

See attached file for explanation.

Download txt
3 0
3 years ago
What does rumor Mean Cause I don't know what it means
aksik [14]
Its like a fake message that people believe. for example say that jimmy went to a party. people might start making up things about what happened with him to make gossip. Rumors are not always true, and they are fake a lot of the time. 
8 0
3 years ago
Read 2 more answers
Who is responsible about developing the security policy in your organization?
riadik2000 [5.3K]

Answer:

Security adviser

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
    6·1 answer
  • How to fix the acount when it says "Uh oh, this account has been restricted because of an unusual amount of activity.
    8·1 answer
  • How to hack the school system
    12·1 answer
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • What is an examlple of cyberbullying
    5·1 answer
  • Two words are a ""reverse pair"" if each is the reverse of the other. Write a program that finds all the reverse pairs in the wo
    12·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a
    13·1 answer
  • Design by contract considers the software system to be a setof:
    10·1 answer
  • Describing Work Styles for Farmworkers and Laborers, Crop
    6·2 answers
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!