1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
3 years ago
8

Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 350 mse

c and 10 msec, respectively (see Section 3.5.3 for a discussion of these variables). Suppose that the next three measured values of the RTT are 220 msec, 260 msec, and 390 msec respectively.
(Compute TCP's new value of DevRTT, estimatedRTT, and the TCP timeout value after each of these three measured RTT values is obtained. Use the values of α = 0.125, and β = 0.25. Round your answers to two decimal places after leading zeros.)
What is the estimatedRTT after the first RTT?
Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
7 0

Answer:

260

Explanation:

I hope it helps choose me the brainest

You might be interested in
You can include up to _____ logical conditions in the and function. (487181)
Allushta [10]
Hi ! 

<span>You can include up to <u>255</u> logical conditions in the and function. </span>
8 0
3 years ago
What do we call the input and output devices that are connected externally to the computer?
Anna35 [415]

Explanation:

computer peripheral is an external device that provides input and output for the computer. for example keyboard and mouse are input peripherals while mouse and printer are output peripherals...

5 0
3 years ago
Read 2 more answers
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
NO THIS ISNT ANY HOMEWORK!
IRISSAK [1]

Answer:

you can run minecraft on virtually anything with the lowest settings and optifine, as long as you dont use shaders or beefy texture packs

Explanation:

4 0
3 years ago
Read 2 more answers
How does technology helps save the environment?​
zubka84 [21]

Answer:

it's easier than using paper from trees

4 0
4 years ago
Other questions:
  • 1. Of which of the following is a box an example?
    10·2 answers
  • Which is the most common drive letter where Windows stores most data and programs? A. A B. B C. C D. E
    12·2 answers
  • Two advantages of Internet are ?​
    7·2 answers
  • Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the n
    7·1 answer
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • Out of a list of the values 8, 3, 30, 5, 15, and 6, what result would the MIN function return?
    9·2 answers
  • Describe what each of the following functions in R do.1. t2. matplot3. c4. seq5. legend6. matrix7. rownames8. colnames9. type of
    14·1 answer
  • Code in Java:
    6·1 answer
  • Which action is applicable only to tables?
    13·1 answer
  • 2
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!