1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
5

We want to transmit 40 packets and the following packets are getting lost, 3,9, 25,28, 35. How many rounds are needed if

Computers and Technology
1 answer:
viktelen [127]3 years ago
8 0

TCP congestion control refers to how the transport layer controls congestion. Usually, the congestion occurs due to: i) packet loss and ii) network traffic. To avoid this, we use three types of algorithm

1. Slow Start

2. Additive Increase

3. Multiplicative decrease

<u>Explanation:</u>

Now, in AIMD (Additive Increase Multiplicative Decrease) the packets are sent to the receiver and are increased or decreased exponentially. The additive increase is used to increase the bandwidth of the congestion window. multiplicative decreases are used whenever there is a packet loss. There is a mathematical formula that defines AIMD.

W (t+1) = {  W(t)+a if congestion is not detected , W(t) * b if congestion is detected }

Where W(t) is sending rate, a is a parameter for additive increase and b is a parameter for the multiplicative decrease. With this formula, we can calculate that in how many rounds can the packets being transferred.

Slow Start is also an algorithm that is used to maintain the speed of a network. It gradually increases the data transferred to the receiver until it reaches the size of the congestion window. First, the sender will send the data packets to the receiver. It will send the initial data packets within the size of the sender’s size of the congestion window and awaits the acknowledgment from the receiver.

If no acknowledgment comes, the sender will not send any more data. Otherwise, the receiver will send back the acknowledgment within its on size. The sender will next send data packets increasing the size. This process goes on until there is no acknowledgment from the receiver or either senders or the receiver’s congestion window is filled.  

You might be interested in
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses. ICANN W3C ISOC IAB
Maurinko [17]

Answer:

ICANN

Explanation:

It handles the installation and processing of various databases related to network domains and provides a consistent and secure networking service and there are incorrect options are described as follows:

  • IAB, which provides a protocol for managing IETF, is therefore incorrect.
  • W3C is used in web development.
  • ISOC is used to provide Internet access.
7 0
3 years ago
The file command provides information about any file system object (i.e., file, directory or link) that is provided to it as an
NeTakaya

Answer:

The answer is "Option a, c, and d".

Explanation:

This command aims to define the argumentation from each entity of the file system like a disc, path, or link. It checks the usage of a measurement system, which is requested to collect the information from either the inode of the item, the description of the option as follows:

  • In option a, It is used to identify the file type.
  • In option c, This command is used to list all file types.
  • In option d, This command is used to list all the current directories.
  • In option b, It is used to describe a single entity directory.
7 0
3 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Dahasolnce [82]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

3 0
3 years ago
When recording a song on her laptop, Sarah noticed a slight delay in what she could hear on her headphone and what she was recor
PolarNik [594]

Answer:

latency

Explanation:

We could have latency if we want to record with a computer, and then we try to hear that record with the headphone.

This is an audio card's characteristic, this is a time between the input, in this case, Sarah recording, and the output Sarah's headphone.

The computer needs time to process the signal, and for that there is latency, but this depends on more of the operative system and the CPU in your computer than the audio card.

6 0
3 years ago
A user is having a difficult time printing certain types of documents to her laser printer. When she sends complex, mult-page, m
katen-ka-za [31]

Answer:

Add RAM to the printer

Explanation:

Adding RAM to the printers gives the following advantages:

  • printer prints the documents faster with reduced print time.
  • printer prints complex multi page, multi-color documents especially PDF files.
  • Print server sends the job according to the capacity of the printer so when the RAM is added the print server can send more jobs and the printing process becomes faster and printer will not refuse to print large documents. As a result printer can accept more print jobs.
  • It is also beneficial when the documents or files to be printed are of high resolution or are heavy files.
5 0
3 years ago
Other questions:
  • Which of the following statements about crane hand signal training are true? A. Both statements are true about crane hand signal
    5·1 answer
  • Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
    5·1 answer
  • When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
    11·1 answer
  • Do rats smell good? what do you think
    8·2 answers
  • Write a regular expression that selects lines containing any of the following words: linux windows solaris macos. For this exerc
    13·1 answer
  • Although some families have more resources than other families, there is always a limited amount of resources that families have
    15·2 answers
  • Introduction to Identity and Fitting In
    7·1 answer
  • What is the role of the W3C? Group of answer choices oversee research and set standards for many areas of the Internet supervise
    10·1 answer
  • The Table Design and Layout tabs are available under the
    13·2 answers
  • It's a holiday poop in my bitt
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!