Computing smallest window size to optimize the throughput

Assignment Help Computer Networking
Reference no: EM1351952

Q1) Consider an error-free 256 kbps satellite channel used to send 1024-byte data frames. Assume that each frame is acknowledged with a short ACK that is sent in a separate channel. What is the maximum throughput if the sender is using a window size of 1, 7, 15, 127? What is the smallest window size that is large enough to optimize the throughput?

Reference no: EM1351952

Questions Cloud

Explain how would a citizen whose income is in the bottom : Explain how would a citizen whose income is in the bottom one percent talk about scarcity and trade-offs.
How can communication be improved in your organization : Organizational Behavior - How can communication be improved in your organization and Is the use of e-mail efficient or effective communication?
Estimate 5 year average return for each security : The organizations are Dell, Ford, UPS, Disney, and Proctor & Gamble. Estimate the five-year average return for each security.
Illustrate what implicit assumptions are the publisher : The Wall Street Journal's experience after an increased its price to 75 cents. Illustrate what implicit  assumptions are the publisher and the analyst making about the price elasticity.
Computing smallest window size to optimize the throughput : Consider error-free 256 kbps satellite channel used to send 1024-byte data frames. What is smallest window size that is large enough to optimize the throughput?
What is the height of the inclined plane : A portable 3.5 kw wate heater is immersed for 3 minutes in a plastic filled with 20 kg of water at 20C. what will be the final temperature of the mixture given specific heat of water at 4186 j/gkC.
Golf equipment industry : Golf Equipment Industry - Prepare a response to the questions below about competition in the Golf Equipment Industry in 2008
Make cabinet according to the buyer''s specifications : Explain A customer requested a price from a carpenter on a teak cabinet to be built according to the buyer's specifications
Characteristics of life-span development : Which of the characteristics of life-span development do you believe to be the most resistant to change? Which one is the most amenable to change? Explain your answer.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  Explain the purposes of poe in wlan design

Explain the purposes of POE in WLAN design. Provide at least 3 scenarios of POE being used as the prime element in WLAN design to address the projects cost

  Information overload by changes to their technical system

Are organizations likely to find better solutions to information overload through changes to their technical systems or their social systems, or both? Why?

  Determining size of ethernet mac addresses

Determine the size of Ethernet MAC addresses?

  Advantage of connecting outer conductor to ground

Coaxial cable is two-wire transmission system, determine the advantage of connecting outer conductor to ground? Explain the two layers: LLC & MAC.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Explaining labels in dns domain names

From RFC 1034, DNS domain names are composed of labels. Are there any labels which nodes are not allowed to allot to their data? If so, what are they?

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Developments in adsl broadband technologies

Show practical and theoretical knowledge of LAN/Internet technologies

  Certificate authority with well-known public key

Suppose there is a Certificate Authority (CA) with well-known public key. Further suppose every user is issued a certificate for his/her public key.

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd