1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
14

Assume a TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends 120 bits of h

eader. This is then transmitted through some networks (via routers), each of which uses a 24-bit of packet header for packet transmissions. The destination network can accept a maximum packet size of 800 bits. How many bits, including headers, are delivered to the network layer protocol at the destination?
Computers and Technology
1 answer:
harkovskaia [24]3 years ago
4 0

Answer:

1852 bits

Explanation:

The total number of bits transmitted = Number of data bits + number of header bits sent to IP layer + number of appended header bits.

The total number of bits transmitted = 1500 bits + 160 bits + 120 bits = 1780 bits

Ratio of number of bits transmitted to maximum packet size = 1780 bits / 800 bits = 2.225 = 3 (to next whole number)

Therefore the number of bits, including headers, are delivered to the network layer protocol at the destination =  total number of bits transmitted + (packet header × ratio)

Number of bits = 1780 bits + (3 × 24 bits) = 1852 bits

You might be interested in
In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a
Eva8 [605]

Using the knowledge in computational language in JAVA it is possible to write a code that write a program that reads the width and height of the wall and the number of windows, using the following prompts

<h3>Writting the code:</h3>

<em>import java.util.Scanner;</em>

<em>public class WallArea {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner sc = new Scanner(System.in);</em>

<em>        final int areaOfWindows = 6;</em>

<em>        System.out.print("Wall width: ");</em>

<em>        double width = sc.nextDouble();</em>

<em>        System.out.print("Wall height: ");</em>

<em>        double height = sc.nextDouble();</em>

<em>        System.out.print("Number of windows: ");</em>

<em>        double numberOfWindows = sc.nextDouble();</em>

<em>        double area = (width * height) - (numberOfWindows * areaOfWindows);</em>

<em>        System.out.println("Area: " + area);</em>

<em>    }</em>

<em>}</em>

See more about JAVA at brainly.com/question/12975450

#SPJ1

4 0
2 years ago
The state department that issues driver's licenses would like a police officer to be able to scan the driver's license and insta
frozen [14]

Answer:

The technology that the state should use is the Optical Character Recognition or OCR system which comprises of a driver license card with bar code or optical code character engraved on it that can be read by optical scanners that are then linked via the internet to access the recorded data regarding the card holder, including outstanding tickets and warrants.

With the system, a police will be able to both verify the authenticity of the drivers license and get answers to questions about the vehicle driver

Explanation:

6 0
3 years ago
Discuss two things you’ve learned about computers
olga55 [171]

Answer:

Time management,

Refreshment,proper input, Need of energy,prioritization.

7 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
What is the correct keyboard shortcut to cut a cell value
vladimir2022 [97]

Answer:

Cntrl+X

Explanation:

Do it on your computer

4 0
3 years ago
Other questions:
  • How to save customised keyboard shortcuts on word
    11·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • What are programming paradigms?​
    9·1 answer
  • In which type of modulation is a 1 distinguished from a 0 by shifting the direction in whichthe wave begins?
    14·1 answer
  • A canister is released from a helicopter 500m above the ground. The canister is designed to withstand an impact speed of up to 1
    15·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • If you were creating a program that would convert Fahrenheit to Celsius, which kind of variable would you want to use? a string
    7·2 answers
  • What improved image quality in televisions?
    5·1 answer
  • Mr. stevens is the principal of a high school. why might he want to export data from a database of students’ exam scores? to cre
    5·2 answers
  • A palindrome is a string whose reversal is identical to the string. how many bit string of length 20 are palindromes and do not
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!