Computing smallest window size to optimize the throughput

Assignment Help Computer Networking
Reference no: EM1351952

Q1) Consider an error-free 256 kbps satellite channel used to send 1024-byte data frames. Assume that each frame is acknowledged with a short ACK that is sent in a separate channel. What is the maximum throughput if the sender is using a window size of 1, 7, 15, 127? What is the smallest window size that is large enough to optimize the throughput?

Reference no: EM1351952

Questions Cloud

Explain how would a citizen whose income is in the bottom : Explain how would a citizen whose income is in the bottom one percent talk about scarcity and trade-offs.
How can communication be improved in your organization : Organizational Behavior - How can communication be improved in your organization and Is the use of e-mail efficient or effective communication?
Estimate 5 year average return for each security : The organizations are Dell, Ford, UPS, Disney, and Proctor & Gamble. Estimate the five-year average return for each security.
Illustrate what implicit assumptions are the publisher : The Wall Street Journal's experience after an increased its price to 75 cents. Illustrate what implicit  assumptions are the publisher and the analyst making about the price elasticity.
Computing smallest window size to optimize the throughput : Consider error-free 256 kbps satellite channel used to send 1024-byte data frames. What is smallest window size that is large enough to optimize the throughput?
What is the height of the inclined plane : A portable 3.5 kw wate heater is immersed for 3 minutes in a plastic filled with 20 kg of water at 20C. what will be the final temperature of the mixture given specific heat of water at 4186 j/gkC.
Golf equipment industry : Golf Equipment Industry - Prepare a response to the questions below about competition in the Golf Equipment Industry in 2008
Make cabinet according to the buyer''s specifications : Explain A customer requested a price from a carpenter on a teak cabinet to be built according to the buyer's specifications
Characteristics of life-span development : Which of the characteristics of life-span development do you believe to be the most resistant to change? Which one is the most amenable to change? Explain your answer.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Calculate the end-to-end delay

Suppose a propagation speed of 100 km/hour. Assume caravan travels 150 km, beginning in front of tollbooth. Calculate the end-to-end delay.

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Vpn access for employees to remotely access

Explain best option for VPN access for employees to remotely access the Ocper, Inc. network and describe your reasoning.

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Social effect of online social networks

What is the social effect of online social networks? 200 words Describe an experience in facebook. at least 100 words.

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

  Design the network for the public network

Your task is to design the network for the public network and select how to connect the two networks together.

  Explaining reconnaissance tools

Write down some popular reconnaissance tools?

  Explaining wireless networking and wep enabled phone

In using wireless networking and WEP enabled phone, how is security important? would you trust the methods that exist today to secure these technologies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd