Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Suppose that a 1Mbps connection is shared by 5 well behaving TCP and 5 UDP sources.
0
votes
101
views
asked
Apr 10
in
Computer Networks
by
anonymous
The maximum window size of the TCP sources is 50 KB. UDP sources send at a speed of 100 Mbps. What is the maximum transmission speed of UDP and TCP sources? Justify your answer.
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
0
votes
1
answer
1.5k
views
Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice’s certificate. In what step of the SSL handshake algorithm will Bob discover that he is not communicating with Alice?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
687
views
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet? (Hint: The answer we are looking for has nothing to do with TCP’s congestioncontrol mechanism.)
asked
Dec 11, 2020
in
Computer Networks
by
anonymous
+3
votes
1
answer
4.8k
views
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
4.6k
views
Suppose you wanted to do a transaction from a remote client to a server as fast as possible. Would you use UDP or TCP? Why?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
8.8k
views
Host Aand B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
912
views
What are three approaches that can be taken to avoid having a single wireless link degrade the performance of an end-to-end transport-layer TCP connection?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.3k
views
Suppose ASs X and Z are not directly connected but instead are connected by AS Y. Further suppose that X has a peering agreement with Y, and that Y has a peering agreement with Z.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.0k
views
Why a network protocol would want to use UDP over TCP? Give an example of an application that would benefit from using the UDP protocol
asked
Oct 6, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.7k
views
We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
5.3k
views
List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
3.9k
views
Suppose that the UDP receiver computes the Internet checksum for the received UDP segment and finds that it matches the value carried in the checksum field. Can the receiver be absolutely certain that no bit errors have occurred? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
9.3k
views
Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
1.1k
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
384
views
Suppose you wish to prove that the following is true for all positive integers nby using the Principle of Mathematical Induction: 1 + 3 + 5 + ... + (2n -1) =n2(a) Write P(1)
asked
Dec 22, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
8.8k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.7k
views
Suppose that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
9.0k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
7.1k
views
Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP datagram.
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
910
views
Suppose you want to encrypt the message 10101111 by encrypting the decimal number that corresponds to the message. What is the decimal number?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
632
views
Consider a traditional (stateless) packet filter. This packet filter may filter packets based on TCP flag bits as well as other header fields. True or False?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
116
views
Is it possible for TCP to send data-less packets on an established connection
asked
Apr 20
in
Computer Networks
by
(user.guest)
0
votes
1
answer
777
views
Signature-based IDSs and IPSs inspect into the payloads of TCP and UDP segments. True or False?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
9.4k
views
Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
2.4k
views
Dial-up modems, HFC, DSL and FTTH are all used for residential access. For each of these access technologies, provide a range of transmission rates and comment on whether the transmission rate is shared or dedicated.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
246
views
Suppose X is N(10, 1). Find (i) P[X > 10.5], (ii) P[9.5 < X < 11], (iii) x such that P[X < x] = 0.95. You will need to use Standard Normal tables?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
379
views
What do you mean by persistant and non-persistant connection
asked
Nov 28, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
140
views
A new version of the TCP header that accommodates a round-trip time of 200ms, a network bandwidth of 100Mbps, a maximum segment lifetime of 150 sec, How many bits will you need for the advertised window field and for the sequence number field?
asked
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
237
views
A bag contains 5 red and 4 blue identical balls, if two are selected at random, one after the other, with replacement, find the probability that the first ball is red and the second is blue
asked
Dec 5, 2021
in
Maths & Statistics
by
(user.guest)
0
votes
1
answer
824
views
Consider WEP for 802.11. Suppose that the data is 10101100 and the keystream is 1111000. What is the resulting ciphertext?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.1k
views
By means of a suitable diagram, show Flynn’s classifications of computer architectures for a Single Instruction Stream, Multiple Data stream (SIMD) with Shared and without a Shared memory.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
669
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
3.8k
views
Suppose Host A sends Host B a TCP segment encapsulated in an IP data-gram.
asked
Oct 1, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.2k
views
Suppose two TCP connections are present over some bottleneck link of rate R bps. Both connections have a huge file to send (in the same direction over the bottleneck link).
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
230
views
Given a total bandwidth for cellular operator as 12.5 MHz. If each voice channel needs a bandwidth of 30 kHz, what is the total number of simplex channels per cluster and per cell in a 7-cell cluster?
asked
Nov 29, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
648
views
Why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-established processes.
asked
Nov 19, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.1k
views
Explain why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-established processes.
asked
Sep 19, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
169
views
A system to convert data from internal and external sources into information and to communicate that information in an appropriate form to managers at all levels in all functions and to enable them to make timely and effective decisions for planning.
asked
Dec 9, 2021
in
Others
by
(user.guest)
0
votes
1
answer
2.9k
views
Consider an overlay network with N active peers, with each pair of peers having an active TCP connection.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
622
views
The RAM is a temporal storage area in the computer system that usually contains the data that are being processed by the CPU. Briefly describe how the CPU and the RAM interacts to carry out their operation.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
178
views
What protocol use UDP only What protocol use TCP only Name 3 protocols separately
asked
Dec 12, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.4k
views
Describe why an application developer might choose to run an application over UDP rather than TCP
asked
May 25, 2021
in
Computer Networks
by
anonymous
–1
vote
1
answer
676
views
Duplicate: Describe why an application developer might choose to run an application over UDP rather than TCP.
asked
Oct 25, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
7.4k
views
Describe why an application developer might choose to run an application over UDP rather than TCP.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.0k
views
Compare and contrast the delays in connectionless and connection-oriented services. Which service creates less delay if the message is large? Which service creates less delay if the message is small?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
2.5k
views
Is HFC transmission rate dedicated or shared among users? Are collisions possible in a downstream HFC channel? Why or why not?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
867
views
If a label in a connection-oriented service is n bits, how many virtual circuits can be established at the same time?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...