1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
5

We want to transmit 40 packets and the following packets are getting lost, 3,9, 25,28, 35. How many rounds are needed if

Computers and Technology
1 answer:
viktelen [127]3 years ago
8 0

TCP congestion control refers to how the transport layer controls congestion. Usually, the congestion occurs due to: i) packet loss and ii) network traffic. To avoid this, we use three types of algorithm

1. Slow Start

2. Additive Increase

3. Multiplicative decrease

<u>Explanation:</u>

Now, in AIMD (Additive Increase Multiplicative Decrease) the packets are sent to the receiver and are increased or decreased exponentially. The additive increase is used to increase the bandwidth of the congestion window. multiplicative decreases are used whenever there is a packet loss. There is a mathematical formula that defines AIMD.

W (t+1) = {  W(t)+a if congestion is not detected , W(t) * b if congestion is detected }

Where W(t) is sending rate, a is a parameter for additive increase and b is a parameter for the multiplicative decrease. With this formula, we can calculate that in how many rounds can the packets being transferred.

Slow Start is also an algorithm that is used to maintain the speed of a network. It gradually increases the data transferred to the receiver until it reaches the size of the congestion window. First, the sender will send the data packets to the receiver. It will send the initial data packets within the size of the sender’s size of the congestion window and awaits the acknowledgment from the receiver.

If no acknowledgment comes, the sender will not send any more data. Otherwise, the receiver will send back the acknowledgment within its on size. The sender will next send data packets increasing the size. This process goes on until there is no acknowledgment from the receiver or either senders or the receiver’s congestion window is filled.  

You might be interested in
Frank has created a résumé and separated the sections using headings. How can he set the headings apart from normal text?
Pepsi [2]
He could use bold or bigger text just a suggestion.
6 0
3 years ago
The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
Sonja [21]

Answer:

false

Explanation:

Select the comment icon. on the slide. The Comments pane will open and you can see comments for that slide.

Select Reply to respond to a comment.

Select the Next or Back buttons to go between comments and slides.

3 0
3 years ago
Read 2 more answers
One way bloggers decide how to present information is by understanding
PSYCHO15rus [73]

I would say strong use of multimedia.

4 0
3 years ago
Read 2 more answers
You want to find the distance between two points.
maks197457 [2]

Answer:

For the first picture, choose the second pair, and for the second one, choose the first pair

Explanation:

5 0
3 years ago
Definition of Computer forensics?
zysi [14]

Answer:

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Explanation:

If this helped you, please consider brainly.

Thank you ,

Miss Hawaii

5 0
3 years ago
Read 2 more answers
Other questions:
  • Every information systems (is) user has the right to a secure computing environment. this means that the
    12·1 answer
  • Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than
    7·1 answer
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • Write the definition of a method min that has two int parameters and returns the smaller.
    9·1 answer
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people
    7·2 answers
  • Write a nested loop to set values as follows: [0] [1] [2] [3] [4] [0] 1 2 3 4 5 [1] 1 2 3 4 5 [2] 1 2 3 4 5 [3] 1 2 3 4 5
    12·1 answer
  • which of the following are good ways for virtual team members to get to know one another? (choose every correct answer.)
    15·1 answer
  • Types of digital divide ​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!