answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
2 years ago
9

Although slow start with congestion avoidance is an effective technique for coping with congestion, it can result in long recove

ry times in high-speed networks, as this problem demonstrates.
A) Assume a round-trip delay of 60 msec (about what might occur across the continent) and a link with an available bandwidth of 1 Gbps and a segment size of 576 octets. Determine the window size needed to keep the pipeline full and the a worst case estimate of the time it will take to reach that window size after a timeout occurs on a new connection using Jacobson’s slow start with congestion avoidance approach.

B) Repeat part (a) for a segment size of 16 kbytes.
Computers and Technology
1 answer:
Serggg [28]2 years ago
6 0

Answer:

The answer to this question can be defined as follows:

In option A: The answer is "13020".

In option B: The answer is "468 Segments".

Explanation:

Given:

The value of round-trip delay= 60 m-second

The value of Bandwidth= 1Gbps

The value of Segment size = 576 octets

window size =?

Formula:

\text{Window size =} \frac{(\text{Bandwidth} \times \text{round} - \text{trip time})}{(\text{segment size window })}

                     =\frac{10^9 \times 0.06}{576 \times 8}\\\\=\frac{10^9 \times6}{576 \times 8\times 100}\\\\=\frac{10^7 \times 1}{96 \times 8}\\\\=\frac{10^7 \times 1}{768}\\\\=13020.83

So, the value of the segments is =13020.833 or equal to 13020

Calculating segments in the size of 16 k-bytes:

\text{Window size} = \frac{10^9 \times 0.06}{16,000 \times 8}

                    = \frac{10^9 \times 0.06}{16,000 \times 8}\\\\ = \frac{10^9 \times 6}{16,000 \times 8 \times 100}\\\\ = \frac{10^4 \times 3}{16 \times 4}\\\\ = \frac{30000}{64 }\\\\=468.75

The size of 16 k-bytes segments is 468.75 which is equal to 468.

You might be interested in
An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security admini
Kruka [31]

Answer:

Form the given statement i have come to know that the by changing hidden form values attacker has been able to modify the purchase price.

Explanation:

User can change a hidden field is not different from a common field from browser or server side.

If you want to store data then user must have to store them on server -side on a session and it is a fastest way.

8 0
2 years ago
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the proc
Misha Larkins [42]

Answer: Time slicing

Explanation:

 Time slicing is one of the technique that basically implement the multitasking in the operating system. It basically generate the interrupt and at the each clock of the interrupt in the operating system basically regain  control and then assign that particular system or processor to the another user.

Time slice are typically work in milliseconds. By using the multi users system, the time slice is the total amount of the processing time for the each user get assigned.

7 0
2 years ago
A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled liv
elena-14-01-66 [18.8K]

The correct answer is B. Check for sufficient available storage space.  

Explanation:

One of the factors that can cause it is not possible to install a new app is insufficient storage as space in the mobile device is needed to save the app. This can be easily solved either by deleting apps and other content or expanding the memory available through a Micro SD card. Also, before attempting any major procedure such as a complete reset it is important to check the storage space availability. In this context, the user should check for sufficient available storage space (option B) because this might be the cause of the issue she is experiencing; also, this is a basic step before considering others such as performing a factory reset.

6 0
2 years ago
Harry Potter and his friends are at Ollivander's with Ron, finally replacing Charlie's old broken wand. Hermione decides the bes
Step2247 [10]

Answer:

SELECT a.id, ab.age, b.min_coins_needed, b.power

FROM(SELECT code, power, min(coins_needed) AS min_coins_needed

 from Wands

 group by power, code) AS b

JOIN Wands wa

 ON a.coins_needed = b.min_coins_needed AND a.code = b.code AND a.power = b.power

JOIN Wands_property AS ab  

 ON a.code = ab.code  

WHERE ab.is_evil = 0          

ORDER BY b.power desc, ab.age DESC;              

Explanation:  

SELECT statement is used to select the columns id, age, coins_needed and power of the wands that Ron's interested in.

It is required to get the minimum coins_needed so, min() aggregate function is used to return the minimum value of coins_needed. So this is how minimum coins needed for wands with same age and power are attained and the resultant set is given the name of min_coins_needed  using alias. This is then grouped by code and power using GROUP BY because code and age has one to one mapping.

Next the JOIN is used to combine columns from two or more relations. Here Wands and Wands_property are joined to obtain id and age.

WHERE clause is used to filter the wands that are not evil.

ORDERED BY is used to sort in order of power and age, the result obtained. DESC is used to sort the result in descending order of power and age.

4 0
2 years ago
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
2 years ago
Other questions:
  • What best describes the purpose of the Recycle Bin (Microsoft Windows) and Trash (Apple Mac) features
    13·2 answers
  • Cathy connected a keyboard, mouse, and printer to her computer through a Bluetooth connection. What type of network has she crea
    10·2 answers
  • Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packet
    6·1 answer
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    12·1 answer
  • 14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
    13·2 answers
  • If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
    6·1 answer
  • You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file
    12·1 answer
  • Write a complete Java program that: Prompts an employee to enter the number of hours that they have worked in a given week and s
    14·1 answer
  • In this image, which feature did we most likely use to quickly change the background, fonts, and layout?
    6·1 answer
  • Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!