1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
2 years ago
5

Suppose TCP uses AIMD for its congestion control without slow start. Assuming cwnd increases by 1 MSS every time a batch of ACKs

is received and assuming approximately constant round-trip times, how long does it take for cwnd increase from 6 MSS to 12 MSS (assuming no loss events)? b. What is the average throughput (in terms of MSS and RTT) for this con-ection up through time = 6 RTT?
Computers and Technology
1 answer:
Scilla [17]2 years ago
5 0

Answer:

The answer is "6 RTT and  \frac{5\ MSS}{3 \ RTT}"

Explanation:

TCP uses AIMD without a sluggish start for congestion control.  

Sliding windows original = 4 MSS  

Every RTT is increased by 1 MSS throughout the congestion window(cwnd).  

In (a):  

Its City is rising between 6 and 12 MSS  

Each RTT cwnd window increases by 1 MSS  

6 MSS | \ 7 MSS | \ 8 MSS | \ 9 MSS | \ 10 MSS | \ 11 MSS | \ 12 MSS

We can see that 6 RTTs from 12 MSS city sizes, so it takes time to achieve 6 MSSs = 6 RTT  

In (b):

Time = 6 RTT

Each RTT cwnd window will up by 1 MSS  

Window Size Original = 4 MSS

4 MSS \ | 5 MSS \ | 6 MSS \ | 7 MSS \ | 8 MSS \ | 9 MSS \ | 10 MSS

It is possible to view the window after 6 RTT (cwnd) = 10 MSS  

\text{Average throughput} =  \frac{window \ size}{time}

                                = \frac{10 \ MSS}{6 \ RTT} \\\\=  \frac{5\ MSS}{3 \ RTT}

You might be interested in
Timeliness is an important goal of any access control monitoring system.<br> A. True<br> B. False
Damm [24]
The answer for this question is true
7 0
3 years ago
If you want to access your home network from your distant garage, a ________ might help boost the signal.
Kryger [21]
Wireless range extender.
6 0
3 years ago
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or perm
Sholpan [36]

Answer:

Piracy.

Explanation:

Piracy refers to copying or duplicating contents and then selling it to market at lower prices without the owners knowledge or permission. Let's assume I designed a software for company "A" at the price of $2500, but someone inside from the company created a copy of that software and sold it in market at price of $200 without my knowledge or permission. This is what we call piracy.

3 0
3 years ago
All of the different devices on the internet have unique addresses.
Sindrei [870]

Answer:

Yes

Explanation:

Just like a human fingerprint, no 2 computers are the same.

3 0
3 years ago
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
Other questions:
  • How should a cover letter begin?
    13·2 answers
  • Why is it important to verify a customer complaint?
    6·1 answer
  • Which finger types the return or enter key?
    6·2 answers
  • One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, relia
    10·1 answer
  • Larry sent an email to Andy. Andy didn't open Larry's email but still understood what the message was. How did Andy determine th
    14·1 answer
  • For anyone who plays warzone, do you think the hdr has earned its spot back after the spr nerf? Be completely honest plz.​
    8·1 answer
  • For BitTorrent, which of the following is true:
    6·1 answer
  • It is a blueprint of a project​
    9·2 answers
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • Here’s my last question
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!