1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
5

Suppose TCP uses AIMD for its congestion control without slow start. Assuming cwnd increases by 1 MSS every time a batch of ACKs

is received and assuming approximately constant round-trip times, how long does it take for cwnd increase from 6 MSS to 12 MSS (assuming no loss events)? b. What is the average throughput (in terms of MSS and RTT) for this con-ection up through time = 6 RTT?
Computers and Technology
1 answer:
Scilla [17]3 years ago
5 0

Answer:

The answer is "6 RTT and  \frac{5\ MSS}{3 \ RTT}"

Explanation:

TCP uses AIMD without a sluggish start for congestion control.  

Sliding windows original = 4 MSS  

Every RTT is increased by 1 MSS throughout the congestion window(cwnd).  

In (a):  

Its City is rising between 6 and 12 MSS  

Each RTT cwnd window increases by 1 MSS  

6 MSS | \ 7 MSS | \ 8 MSS | \ 9 MSS | \ 10 MSS | \ 11 MSS | \ 12 MSS

We can see that 6 RTTs from 12 MSS city sizes, so it takes time to achieve 6 MSSs = 6 RTT  

In (b):

Time = 6 RTT

Each RTT cwnd window will up by 1 MSS  

Window Size Original = 4 MSS

4 MSS \ | 5 MSS \ | 6 MSS \ | 7 MSS \ | 8 MSS \ | 9 MSS \ | 10 MSS

It is possible to view the window after 6 RTT (cwnd) = 10 MSS  

\text{Average throughput} =  \frac{window \ size}{time}

                                = \frac{10 \ MSS}{6 \ RTT} \\\\=  \frac{5\ MSS}{3 \ RTT}

You might be interested in
Linda installed a special pool for the hydrotherapeutic treatment of severe arthritis, as prescribed by her doctor. The cost of
stellarik [79]

Answer:

Linda is entitled to deduction (before any AGI limitations) of $896 in one year of installation of the pool.

Explanation:

Following is explained calculation for deduction (before any AGI limitations) that is Linda entitled to in the year of installation of the pool.

Given that:

Cost of Installing the pool = $22,400

Paid by insurance company = $5,600

So by deducting the price paid by insurance company from total cost the balance becomes:

Balance = $22,400 - $5,600 = $ 16,800

As the pool increased the value of house by $7,840 so we will deduct this amount from balance:

Balance = $ 16,800 - $7,840 = $8,960

As the useful life given for pool is 10 years so we will divide the balance with 10 to obtain the deduction amount for 1 year:

Deduction amount for one year = $8,960/10 = $8,96

Hence $8,96 will be deducted in one year installation.

i hope it will help you!

7 0
3 years ago
Find and fix the error in the if-else statement. import java.util.Scanner;
salantis [7]

Answer:

Hi there Rumanruxi! The error is in the if statement "if(userNum = 2)".

Explanation:

The if statement in this Java code is assigning userNum the value of 2 instead of comparing it with the value of 2. For equals comparison we need to write two equals "==" in the statement as: "if (userNum == 2)". This will return true if userNum is 2 otherwise it will return false.  

3 0
3 years ago
Read 2 more answers
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
The details of _____ vary from state to state, but generally create personal jurisdiction over nonresidents who transact busines
irinina [24]

Answer: B. LONG-ARM STATUTES

Explanation: long-arm statute is the jurisdiction that gives a court the authority to prosecute a case involving an out of state defendant or resident based on certain acts committed by the out of state defendant or resident with the premise that the out of state defendant or resident has a minimum connection with the state.

Which means the out of state defendant or resident must have a systematic and constant activity within the Jurisdiction of the Court and a cause of action that came up from that activity.

6 0
3 years ago
Read 2 more answers
The Internet is written in a "language" called
olganol [36]

Answer:

HTTP

Explanation:

I hope it helps u.

Mark Me as brainlist answer

4 0
3 years ago
Read 2 more answers
Other questions:
  • Local television news networks cover only
    8·2 answers
  • Does any one here play destiny on xbox one
    12·1 answer
  • Where do you place the logical test argument in an JF function formula?
    5·2 answers
  • VOTE!
    11·1 answer
  • Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
    11·1 answer
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
  • Students enrolled in a digital classroom participate in discussions and take field trips with classmates. watch instructional vi
    11·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • On which tab are the print commands in Excel 2016 accessed?
    7·2 answers
  • Assign listNodes with all elements with a clasa name prog-lang
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!