1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
4 years ago
5

Consider the latency model for static congestion windows. If the server receives an acknowledgement for the first data segment i

n the first window before the server completes the transmission of the first window, then the latency for an object of size O is:
Computers and Technology
1 answer:
Angelina_Jolie [31]4 years ago
7 0

Answer:

Latency of an object O is shown below.

Explanation:

W segment and stalled state transmits nothing and waits for acknowledgement. The latency is 2 R TT + the time required for server that are using to transmit the object + the amount of time when server is in stalled state. Let K be the number of window that is K= O/WS .The serveries stalled state where K-1 is period of ime with period lasting RTT-(W-1)S/R

latency = 2RTT +O/R +(K-1)[S/R +RTT - WS/R]

After combining the two case

latency = 2 RTT + O/R + (K-1)[S/R +RTT - WS/R]

where [x] means maximum of (x.0). This is the complete ananlysis of the static windows.

server time for transmit the object is (K-1)[S/R +RTT - WS/R]

You might be interested in
1. Write a program that asks the user to enter a string. The program should then print the following: (a) The total number of ch
Kazeer [188]

Answer:

s = input("Enter a string: ")

print(len(s))

print(s*10)

print(s[0])

print(s[:3])

print(s[len(s)-3:])

print(s[::-1])

if len(s) >= 7:

   print(s[6])

else:

   print("The string is not long enough")

print(s[1:len(s)-1])

print(s.upper())

print(s.replace("a", "e"))

Explanation:

*The code is in Python.

Ask the user to enter a string

Use len method to get the total number of characters

Use "*" to repeat 10 times

Use index, 0,  to get first character

Use slicing to get first three characters

Use slicing to get last three characters

Use slicing to get it in backwards

Check if the length is greater than or equal to 7. If it is, use index, 6. Otherwise, print a message.

Use slicing to remove first and last characters

Use upper method to get it in all caps

Use replace method to replace the "a" with the "e"

6 0
4 years ago
Which of these converts analog audio signals into digital codes in a computer?
DaniilM [7]
It would either be A. Audio card or D. Sound card but most likely A
6 0
3 years ago
Read 2 more answers
True false) ther are five arrow keys on the keborad​
cluponka [151]

Answer:

false, there's only 4

Explanation:

5 0
4 years ago
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
Which guideline should you follow when selecting the font for a presentation?
diamong [38]
Most teachers prefer you to use Arial or Times New Roman
3 0
4 years ago
Other questions:
  • What will be the biased exponent of 1,100.1? <br> A:130<br> B:127<br> C:-127<br> D:2^3
    12·2 answers
  • Which type of multiplexing divides transmission opportunities into slots of 125 microseconds with position inside each slot rese
    10·1 answer
  • How many possible mac addresses are there?
    5·1 answer
  • In the context of information systems, which of the following is a disadvantage of prototyping? a. A prototype is more difficult
    8·1 answer
  • You create a new three-way mirror storage space. You format the storage space by using ReFS. Which two features can you use on t
    13·1 answer
  • Copyright laws were established :A. to allow authors to distribute their work while maintaining certain ownership rights. B. to
    8·1 answer
  • A_______is a limitation imposed on the engineer. It can be a limitation on
    5·1 answer
  • Edhesive lesson practice 8.3, question 5
    10·1 answer
  • Spam is _____.
    8·1 answer
  • Characteristics of partial copy sandboxes versus full sandboxes? choose 2 answers
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!