How many packets are to be resent

Assignment Help Computer Networking
Reference no: EM131894780

Problem

Answer the following questions related to the FSM's for the Go-back-N protocol with m = 6 (Figure 13.26):

a. The sending machine is in the ready state with Sf = 10 and Sn = 15. What is the sequence number of the next packet to send?

b. The sending machine is in the ready state with Sf = 10 and Sn = 15. A time-out occurs. How many packets are to be resent? What are their sequence numbers?

c. The sending machine is in the ready state with Sf = 10 and Sn = 15. An ACK with ackNo = 13 arrives. What are the next values of Sf and Sn?

d. The sending machine is in the blocking state with Sf = 14 and Sn = 21. What is the size of the window?

e. The sending machine is in the blocking state with Sf = 14 and Sn = 21. An ACK with ackNo = 18 arrives. What are the next values of Sf and Sn? What is the state of the sending machine?

f. The receiving machine is in the ready state with Rn = 16. A packet with sequence number 16 arrives. What is the next value of Rn? What is the response of the machine to this event?

Reference no: EM131894780

Questions Cloud

What is the response of the machine to the given event : The size of the window is 8. A packet with sequence number 18 arrives. What is the next value of Rn? What is the response of the machine to this event?
How do differences in international hr management : How do differences in international HR management (IHRM) strategies affect the relative importance of each of the HR domains?
Discuss the workforce diversity : HRMD 651 Of the trends (e.g. technology, workforce diversity, big data, mobile learning, etc.), which two or three do you think will influence.
How important are laws to protect the prosperity of business : How important are laws to protect the prosperity of businesses? How important are laws to protect society from the (perhaps unintended) costs of business?
How many packets are to be resent : The sending machine is in the ready state with Sf = 10 and Sn = 15. A time-out occurs. How many packets are to be resent? What are their sequence numbers?
Analyze the limitations on the use of contract options : Analyze the limitations on the use of contract options. Determine the advantages and disadvantages for a 10-year contract option versus a two-year contract.
Prepare the journal entry for diablo company : Prepare the journal entry for Diablo Company at the inception of the lease on January 1, 2013
What are some parallels between the us and south africa : What are some parallels between the U.S. and South Africa today? What are some differences?
Determine the surveillance methods : Determine the surveillance methods that are best suited for a construction contract or information technology contract. Support your position with an example.

Reviews

Write a Review

Computer Networking Questions & Answers

  Terms of disaster recovery

In terms of disaster recovery, what are the seven elements that need to be considered during and after a disaster?

  Rewrite the ip addresses using binary notation

Rewrite the following IP addresses using binary notation- 12.74.16.18/22

  Describe ah tunnel between gateways-using esp-transport mode

Packets based on packet header. Describe the rationale for having AH tunnel between gateways and using ESP in transport mode between two hosts.

  Explain different strategies-transfer file between computers

In second strategy, packets are not acknowledged individually, but whole file is acknowledged when it arrives. Explain the two approaches.

  Identify and report network threats

MN502 - Overview of Network Security - Security Challenges in Emerging Networks - Identify and report network threats, select and implement countermeasures

  Describe basic wireless network maintenance functions

Describe basic wireless network maintenance functions. Producers are continuously releasing firmware upgrades for their products. If you were manager of WLAN.

  Compare and contrast bri and pri isdn

Compare and contrast BRI and PRI ISDN.- What is a 2B+D?-  How does MPLS work?- Compare and contrast circuit-switched services, dedicated-circuit services, and packet-switched services.

  Decide what you believe is the biggest ethical issue

question 1 imagine you are an entrepreneur starting a new business venture. take a position on whether or not you would

  Prepare a plan for implementing hyper-v

Prepare a plan for implementing Hyper-V (or an alternate solution, such as VMware) as a solution for your organization. Provide a rationale for the plan decisions.

  Global business communication

From life and work experiences, discuss some of the problems or pitfalls of conducting business on the telephone and through e-mail; how about other tools such as video conferencing and chatting?

  Discuss the advantages and disadvantages of star topologies

Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model

  Design private subnetworks

Complete the table below for CIDR Prefixes, available IP addresses and Their Decimal Equivalent - design and accommodate the above 10 subnets,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd