1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
5

We want to transmit 40 packets and the following packets are getting lost, 3,9, 25,28, 35. How many rounds are needed if

Computers and Technology
1 answer:
viktelen [127]3 years ago
8 0

TCP congestion control refers to how the transport layer controls congestion. Usually, the congestion occurs due to: i) packet loss and ii) network traffic. To avoid this, we use three types of algorithm

1. Slow Start

2. Additive Increase

3. Multiplicative decrease

<u>Explanation:</u>

Now, in AIMD (Additive Increase Multiplicative Decrease) the packets are sent to the receiver and are increased or decreased exponentially. The additive increase is used to increase the bandwidth of the congestion window. multiplicative decreases are used whenever there is a packet loss. There is a mathematical formula that defines AIMD.

W (t+1) = {  W(t)+a if congestion is not detected , W(t) * b if congestion is detected }

Where W(t) is sending rate, a is a parameter for additive increase and b is a parameter for the multiplicative decrease. With this formula, we can calculate that in how many rounds can the packets being transferred.

Slow Start is also an algorithm that is used to maintain the speed of a network. It gradually increases the data transferred to the receiver until it reaches the size of the congestion window. First, the sender will send the data packets to the receiver. It will send the initial data packets within the size of the sender’s size of the congestion window and awaits the acknowledgment from the receiver.

If no acknowledgment comes, the sender will not send any more data. Otherwise, the receiver will send back the acknowledgment within its on size. The sender will next send data packets increasing the size. This process goes on until there is no acknowledgment from the receiver or either senders or the receiver’s congestion window is filled.  

You might be interested in
Which option ie an example of an html end tag
Kay [80]
Any end tag in HTML needs to look like this, the word body used in this example is one of the more important elements, but you can replace it to any real element in HTML:
i.e. </body>
8 0
3 years ago
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
3 years ago
Read 2 more answers
Call of duty vanguard, war zone , fornite, gta what’s your favorite
tia_tia [17]
Warzone easily but gta a close second
8 0
2 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
The basic form of backup used in magnetic tape operations is called
Harrizon [31]
Answer is the son-father-grandfather concept. Good luck
5 0
2 years ago
Other questions:
  • I want to work on cloud computing and i need some help on how to start ?
    6·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • In information systems, _____ is information from a system that is used to make changes to input or processing activities.
    6·1 answer
  • Michael Holliday is a business systems analyst who is working on a feasibility study for a new​ e-911 system for the city of Mem
    6·1 answer
  • Which leader of the Jamestown colony am I?
    15·2 answers
  • Which of the following problems is least likely to be solved through grid computing? Financial risk modeling Gene analysis Linea
    14·1 answer
  • Use the Date object and the Array object to determine and diplay information about the current date on your webpage. Your output
    11·1 answer
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!