How many atm packets will it take to carry the ack

Assignment Help Basic Computer Science
Reference no: EM131046187

The IP datagram for a TCP ACK message is 40 bytes long: It contains 20 bytes of TCP header and 20 bytes of IP header. Assume that this ACK is traversing an ATM network that uses AAL5 to encapsulate IP packets. How many ATM packets will it take to carry the ACK? What if AAL3/4 is used instead?

Reference no: EM131046187

Questions Cloud

Fortunes in the global logistics services industry : In 2009, DHL ended its domestic air express service in the United States. In addition to requiring the abandonment of a massive sorting facility and dozens of brightly colored jumbo aircraft, the pullback put 9,500 U.S. employees out of work. DHL'..
What information are you prepared to tell the customer : Create a network schedule, add the budget planned value (PV) by time period using the data in the exercise, and apply the completion status information to develop a status report for the project at the end of Period 4 and at the end of Period 8.
Explain why the effective bandwidth of aal5 is always same : Explain why the effective bandwidth of AAL5 is always the same as, or higher than, that of AAL3/4, given a PDU of a particular size.
What is the difference in a logical and physical topology : What is the best practice Ethernet at the present time? Describe, and explain why this is best practice. What is the best practice wireless at the present time? Describe and explain why this is best practice. Would you install a wired or wirel..
How many atm packets will it take to carry the ack : How many ATM packets will it take to carry the ACK? What if AAL3/4 is used instead?
Develop a branding strategy for your product : Develop a branding strategy for your product that covers the brand name, logo, slogan, and at least one (1) brand extension - Develop your company's mission statement and company introduction.
Cultural blunders in an internet search engine : Various Web sites list cultural blunders or faux pas (false steps) people make in their international interactions. Neglecting to develop relationships (as in "Just sign the contract, I'm in a hurry!") and making too-casual use of first names (as ..
Production function for a firm : Given the above information, what is the value of output? What is the total cost of producing the output you calculated in (a)? What is the average total cost of producing this level of output? Round your answer to the nearest hundredth.
When the user data is 512 bytes long : What percentage of the total bandwidth is consumed by all nonpayload bits in AAL3/4 and AAL5, when the user data is 512 bytes long?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Latest threats and security issues

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk t..

  How might a cio with a larger budget have an advantage

How might a CIO with a larger budget have an advantage over Sadiq Rowther at J&J Philippines?

  Potential physical vulnerabilities and threats

Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require cons..

  Find out winner in card game

When there is tie, nobody loses. If first two cards total 8 or 9, hand is called a "natural" and it wins automatically, unless both hands have equal value "naturals", in which case it's a tie.

  Write a function to evaluate a polynomial

Write a function to evaluate a polynomial at a given real value a. That is define a function eval(P,a) that takes a list (polynomial) P and a given real number a, and computes P(a).

  Compare and contrast twisted pair cable

Compare and contrast twisted pair cable, coaxial cable, fiber-optics, and wireless for this application. You should create a table or flow chart which would facilitate choosing between these options depending on circumstances.

  Tsee economic espionage and the protection of trade secrets

economic espionage and the protection of trade secrets have become increasingly important as domestic and international

  Display an appropriate message comparing the month expenses

Display an appropriate message comparing the month's expenses to the budget.

  Create two-page written analysis for problem statement

Create a two-page written analysis based on the following specification: Problem statement, Possible outcomes if no action taken (this one is mine and the only thing i have to do) Alternative actions.

  Nist criteria for selection of des and aes relate to shannon

How do the NIST criteria for selection of DES and AES relate to Shannon's original standards of a good cryptographic system?

  Compare this with existing distance-vector router learning

Assume that routers only receive new-network notices from other routers, and that the originating routers receive their IP network information via configuration

  Main advantage b-trees

Explain the main advantage B-trees have over a multilevel index of the type.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd