Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Suppose you have to develop an error recovery protocol for a link that is unreliable and delay sensitive, which of the following protocol would you choose?
(i) Stop & wait.
(ii) Selective Repeat.
(iii) Go back.
Justify your answer.
Selective- repeat and Go -back both work well if errors are rare. Although if error rate is high than many bandwidth will be wasted in retransmission of frames. Therefore both the above methods are not appropriate for a link which is unreliable and delay sensitive. For such type of link stop and wait protocol is most appropriate protocol. In such protocol sender waits after transmitting all packets. While the receiver is ready for other packet, the receiver sends a control message, as a rule in form of acknowledgement. Though such protocol prevents over run, they can reason extremely inefficient utilization of network capacity.
i want computer help plese help me
What are the steps comprised in authentication? Steps in Authentication: The control over the access of the resources within the repository is exercised in two steps tha
Digital Signatures. A digital signature is an electronic rather than a written signature that can be used by someone to validate the uniqueness of the sender of a message or of
Solve the following 8-department problem using the MIP method. What is the resulting layout and flow-distance score? Note that the aspect ratio of each department should be 2.
Advantages of random scan display Early computer displays: basically an oscilloscope. Control X, Y with vertical/horizontal plate voltage. Often used intensity as
Define the Fundamentals of computer system A computer processes digital information. In order to do that it runs (executes) a machine language program. As an illustration, when
What are the techniques of Data Collection It can be either automatic or manual. Manual techniques can include: - Keypads/Keyboards to type in data - touch screens to s
Hyper-threading works by duplicating those parts of processor which store architectural state but not duplicating main execution resources. This permits a Hyper-threading equipped
With reference to telephone traffic, explain the terms GOS. GOS: in loss systems, the traffic carried through the network is usually lower than the actual traffic offered to
Q. How Dreamweaver Work in Layout View? Dreamweaver has two visual design views-Standard view and Layout view. You will start by working in Layout view, which allows you to dra
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd