1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
15

Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim

ation, this means there is a 10% chance of losing the whole packet due to loss of a fragment. What is the probability of net loss of the whole packet if the packet is transmitted twice?
a. assuming all fragments received must have been part of the same transmission?
b. assuming any given fragment may have been part of either transmission?
c. explain how use of the IDENT field might be applicable here.
Computers and Technology
1 answer:
Marysya12 [62]3 years ago
6 0

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

You might be interested in
Which of the following is a basic principle of improvement?
lesya [120]

From the given the statement, "every system is perfectly designed to get the results it gets" is a basic principle of improvement.

Option B

<u>Explanation:</u>

The improvement activity begins with the quote ‘every system is perfectly designed to get the results it gets’, by W. Edwards Deming; The quote states both the unintended and intended effects are designed into our systems.

For example: Healthcare in the UK has been perfectly designed to lower the waiting times to 18 weeks for various procedures over last twelve years. Reflecting on Safer Patients Initiative (SPI), this can be true to improvement systems: every improvement system is perfectly designed to get the results its gets and SPI is a case in point.

The leading improvements that need to be designed into our improvement systems:

  • Improvement activity needs to be built on strong foundations
  • Greater engagement with people’s intrinsic motivation
  • Embrace a wider set of methods
  • Greater understanding of how systems and processes outside direct clinical care contribute to safety and quality.

So, it can be concluded that the line given by W. Edwards Deming tends to be the principle of improvement.

6 0
3 years ago
D. Convert binary fraction .10112 to Decimal fraction.
Vaselesa [24]
To convert binary fraction to decimal fraction, we first write the given

.1011 (base 2)

The process of conversion is to break down to its decimal constituent,

.1011 (base 2) = (1*2^-1)+(0*2^-2)+(1*2^-3)+(1*2^-4)
.1011 (base 2) = 0.5 + 0 + 0.125 + 0.0625
.1011 (base 2) = 0.6875 (base 10)

<em>ANSWER: 0.6875 (base 10)</em>
6 0
4 years ago
For the following code, if the input is negative, make numitemsPointer be null. Otherwise, make numitemsPointer point to numitem
weeeeeb [17]

Answer:

The program to this question can be described as follows:

Program:

#include <stdio.h> //defining header file  

int main() //defining main method

{

int* numItemsPointer; //defining pointer variable

int numItems; //defining integer variable

scanf ("%d", &numItems); //input value from user end

if(numItems < 0) //defining if block to check value

{

   numItemsPointer = NULL; //assign value to null

   printf ("Items is negative\n"); //print message

}

else //else block

{

   numItemsPointer = &numItems; //holds address

   numItems = numItems * 10; //multiple by 10

   printf("Items: %d\n", *numItemsPointer); //print value

}

return 0;

}

Output:

99

Items: 990

Explanation:

In the above program two integer variable "numItemsPointer and numItems" is defined, in which numItemsPointer is a pointer variable and numItems is integer variable, in which we input value from the user end, and an if condition statement is used, that check and calculate the values, which can be described as follows:

  • In the if block a condition is defined that variable "numItems" is less then 0, if this condition is true so, inside the block, it will assign a value, that is equal to "NULL", and prints its value.
  • If the condition is not true it will go to the else block, in this block, it will first pointer variable holds the variable address, and multiply the value by 10, and prints pointer variable value.
7 0
3 years ago
Read 2 more answers
Select all that apply.
bagirrra123 [75]

Answer:

explain

Explanation:

sorry didn't understand a thing you said except copying and pasting documents

3 0
3 years ago
Read 2 more answers
The total nodal delay includes:
blondinia [14]

Answer:

all of the above

Explanation:

Total nodal delay is the sum of all types of delay.There are basically four types delay that are as following:-

  1. Processing Delay.
  2. Propagation Delay.
  3. Transmission Delay.
  4. Queuing Delay.

T(nodal)=T(processing)+T(propagation)+T(transmission)+T(queuing).

Where T is the delay time.We are given with propagation,transmission and processing.Nodal delay includes these 3 delays.

Hence we conclude that the answer is all of the above.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write the Python code to implement each step of the following algorithm. Your code should use descriptive variable names and per
    7·1 answer
  • All of the following are organization habits except:
    10·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • Keisha wants to change the default printer before printing an e-mail. Which steps will accomplish this task?
    10·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • The process of learning by making mistakes and by trial and error is called _____.
    6·1 answer
  • What is the difference between autofocus and autocomplete
    8·1 answer
  • What type of measurement are each of the following
    8·1 answer
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
  • les agrees to install a new hard drive and software on marilee's computer in exchange for four of her used textbooks. after he i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!