Hire Our Expert Programmer & Technical Writer to do your Capstone Project
Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Capstone Project
Blog
Donate
Ask a Question
Consider you have 10 data packet from 0 to 9. In Go-back-N and Selective repeat both have window size of 5. While transferring packet, ACK2 is lost. What will happened then? Show the scenario with proper figure.
0
votes
411
views
asked
Apr 19, 2021
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
0
votes
0
answers
363
views
Compare and contrast in between Go-Back-N and Selective repeat? Which one is less complex while sending a lots of packets? Provide your opinion.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
265
views
Suppose X is N(10, 1). Find (i) P[X > 10.5], (ii) P[9.5 < X < 11], (iii) x such that P[X < x] = 0.95. You will need to use Standard Normal tables?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
1.5k
views
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
9.3k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
299
views
What could be the reason why the application of the 5 rules of transformation from Entity-Relation to Relation would not produce a collection of relations in 3rd Normal Form. Back your proposal with examples.
asked
Nov 8, 2021
in
Database Management Systems
by
anonymous
–1
vote
1
answer
1.9k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
3.8k
views
Consider the integration and configuration process model in the figure shown below. Explain why it is essential to repeat the requirements engineering activity in the process.
asked
Sep 23, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.0k
views
From Figure 9.4, you can see that impact analysis is an important sub-process in the software evolution process. Using a diagram, suggest what activities might be involved in change
asked
May 28, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
6.3k
views
An Ethernet MAC sublayer receives 1510 bytes of data from the LLC layer. Can the data be encapsulated in one frame? If not, how many frames need to be sent? What is the size of the data in each frame?
asked
Sep 24, 2020
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Disclaimer
: Every user is
solely responsible
for
anything
that he/she
posts
or
uploads
on CPENTalk.
...