1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
11

CP/IP over Ethernet supports basic frames with a total size of up to 1518 bytes (including both the message payload and headers)

. Suppose that an application protocol wants to send an L-byte message across the network to its peer over TCP/IP. The TCP segment adds 20 bytes of header to the payload, while IP packet adds an additional 20 bytes of header to the segment. If the Ethernet frame adds 18 bytes of header to the packet, calculate the size of L the application needs so that exactly 90% of the transmitted bits in the physical layer carry the message payload (i.e., the data itself, not the header). Show your calculations.
Computers and Technology
1 answer:
Ne4ueva [31]3 years ago
6 0

Answer:

I think you just add all the Bytes together

You might be interested in
The space where text and content is entered and positioned for onscreen reading or printing
tino4ka555 [31]

Answer:

Page.

Explanation:

A page typically occupies the largest portion of a document layout as it houses the main writeup or content of the document. The text contained in a document is written on a the main page of the document. The main page is surrounded by the page margin, which is an area which separates the tips or edges of an entire papwr and the writing area (page) of the document. The insertion point refers to an indicator which shows the position which a typed character will fall or be placed. Content written on a document's page is what is printed when the document is to be printed out and test entered on the page are what is seen by the reader.

4 0
3 years ago
My current lesson is The Excel Screen and Worksheets and the question is:
Usimov [2.4K]
I can't tell you the answer without a picture, but to find the answer yourself: Go straight up from the cell containing 'Activity Questions' this will tell you a letter such as B. Go directly across to the left of the cell containing 'Activity Questions' this will tell you a number such as 3. The name of the cell I used as an example would be called B3.
3 0
4 years ago
You're in the process of downloading some email messages when your antivirus software displays an alert. you assume the software
Y_Kistochka [10]
Please provide additional information in order to provide an answer to your question.
7 0
3 years ago
Under which menu would you be able to see the number of continuous track minutes available on each mounted hard drive at the cur
Crazy boy [7]

Answer:

looooollll

Explanation:

yooooooooo u good

3 0
2 years ago
.To remove data from a table we use the DELETE verb? (true/false)
Andrew [12]

Answer:

The correct answer for the given question is "true".

Explanation:

Yes delete is a verb in a database table  because it perform the action it means it will delete the data or record from a database table .The SQL query of delete is

Delete from tablename ;

For example :delete name from student;

In this query name will deleted from student table this action will be performed by delete query so we conclude that delete is a verb.

5 0
3 years ago
Other questions:
  • Q) Select the two obstacles for data parsing
    5·2 answers
  • Which protocol would you utilize to upload files to a web server?
    14·1 answer
  • Given an array a, declared to contain 34 elements, write an expression that refers to the last element of the array.
    12·1 answer
  • Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255
    13·1 answer
  • David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in h
    14·1 answer
  • While conducting an IS audit of a service provider for a government program involving confidential information, an IS auditor no
    14·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • Which of the following best describes the difference between software and hardware?
    9·2 answers
  • Pls help me with this pls
    7·2 answers
  • According to the video, what types of education are useful for Database Administrators? Check all that apply.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!