1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
15

Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim

ation, this means there is a 10% chance of losing the whole packet due to loss of a fragment. What is the probability of net loss of the whole packet if the packet is transmitted twice?
a. assuming all fragments received must have been part of the same transmission?
b. assuming any given fragment may have been part of either transmission?
c. explain how use of the IDENT field might be applicable here.
Computers and Technology
1 answer:
Marysya12 [62]3 years ago
6 0

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

You might be interested in
What permanent magnets of a motor are replaced with more powerful ones, what effect do you think this would have on motor rotati
Marat540 [252]
When permanent magnets of a motor are replaced with more powerful ones, the motor rotation will increase. This is because there is more electricity being generated.
7 0
3 years ago
Read 2 more answers
Which attribute of the use of color improves the visual appeal and user understanding of different elements of a web page?
Charra [1.4K]

Answer:

Contrast

Explanation:

Contrast between different colors on web page helps increase readability and user experience.It can assist user in better understanding website structure. Generally contrasting colors enhance readability as the are more distinguishable from other color.White text on yellow background would be less readable than on black background, due to low contrast between yellow and white.

7 0
4 years ago
Which measurement symbol is this?<br><br><br>PLS HELP ME​
andreev551 [17]

Answer:

hi! can you please leave the symbol so I can help you??

Explanation:

6 0
3 years ago
Read 2 more answers
Match the appropriate words to complete the paragraph.Wireless networks have no clear boundaries, therefore securing communicati
lawyer [7]

Answer:

a. Encryption.

b. Authentication.

c. Strong.

d. Rogue.

e. Insecure.

f. Hacking.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Wireless networks have no clear boundaries, therefore securing communications requires strong encryption, authentication, and strong protocols. One of the most common wireless security threats is the presence of rogue access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an insecure wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of hacking.

6 0
3 years ago
int[] num = new int[100];for (int i = 0; i &lt; 50; i++)num[i] = i;num[5] = 10;num[55] = 100;What is the value of num.length in
Lubov Fominskaja [6]

Answer:

Option 2: 100

Explanation:

The given code is regarding a Java array. To create an array in Java, the syntax is as follows:

type [] arrayname = new type[size]

In Java, this is possible to set a size for an array by giving an integer within the bracket. For example, int [] num = new int[100] will set the array size 100 for <em>num</em> . This means the <em>num</em>  can hold 100 components within the array.

Once the size is set for an array, the size cannot be changed in later stage.

6 0
3 years ago
Other questions:
  • When you save a Notepad file for the first time, you must also A. print a copy for your records. B. give it a name. C. check the
    11·1 answer
  • Which of the following sentences is written in a passive voice
    5·2 answers
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • When you purchase an item in a store, you may be charged __________.
    11·2 answers
  • Visual culture is an area of academic study that deals with the totality of images and visual objects produced in ____________,
    6·1 answer
  • Recent advances in information technologies (IT) have powered the merger of online and offline retail channels into one single p
    10·1 answer
  • What are the objectives of the computer communication with the surrounding world? ​
    11·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
  • How many parts does status bar consist ?​
    7·2 answers
  • How do I fix when it hits the second session it skips scanf..
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!