Question

Referring to the figure below, let us say that PC A is sending a large file (i.e., multiple segments) to PC B and that the li

0 0
Add a comment Improve this question Transcribed image text
Answer #1

No, the Segments that have left PC A but not arrived at PC B will not be lost. Indeed they will search for an alternative path to PC B when that link x goes down. In this case, an alternative route exists, and hence if the link fails, the segments won't be lost. The blowdown of the link will just affect the transmission speed as the segments that were meant to follow that x link path now will follow some other path that will block the other segments passage and thereby slowing down the transmission.

Add a comment
Know the answer?
Add Answer to:
Referring to the figure below, let us say that PC A is sending a large file (i.e., multiple segme...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Let us say that the window size of a given TCP session is 1200 bytes and...

    Let us say that the window size of a given TCP session is 1200 bytes and the initial sequence number is 512, Assume that the following segments have been sent (the segment marked with an X has been lost) Host B Host A 400 bytes 400 bytes 400 bytes Assuming that expectational acknowledgements are being used, give the expectational acknowledgement number that is sent back to Host A.

  • 2. Neighbor Identification. MATLAB language Many engineering problems can be solved numerically by dividing a large,...

    2. Neighbor Identification. MATLAB language Many engineering problems can be solved numerically by dividing a large, compli- cated geometry into a multitude of smaller easier-to-solve cells. The quantities rep- resented in an individual cell (for example, temperature, velocity, and/or pressure) depend only on the values of those quantities stored at the cell’s nearest neighbors. In this problem, we will write a script to identify all the neighbors of a given cell in a rectangular array. Consider the numbered setup shown...

  • Question to the Scenario below: Keeping in mind that it takes time/energy to implement systems to...

    Question to the Scenario below: Keeping in mind that it takes time/energy to implement systems to retrieve data, which HR metrics should start Paul capturing? Scenario: “John, our production numbers are getting worse,” said Roy, who is John’s manager at the small plastic molding company. “What’s going on?” “ We've laid off several people in my area,” replied John. “Can't you get them to work harder? asked Roy. “Before the layoff, we had a lot of people quitting,” said John....

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • Consider a cylindrical capacitor like that shown in Fig. 24.6. Let d = rb − ra...

    Consider a cylindrical capacitor like that shown in Fig. 24.6. Let d = rb − ra be the spacing between the inner and outer conductors. (a) Let the radii of the two conductors be only slightly different, so that d << ra. Show that the result derived in Example 24.4 (Section 24.1) for the capacitance of a cylindrical capacitor then reduces to Eq. (24.2), the equation for the capacitance of a parallel-plate capacitor, with A being the surface area of...

  • 1 Overview The goal of this assignment is to help you understand caches better. You are...

    1 Overview The goal of this assignment is to help you understand caches better. You are required to write a cache simulator using the C programming language. The programs have to run on iLab machines. We are providing real program memory traces as input to your cache simulator. The format and structure of the memory traces are described below. We will not give you improperly formatted files. You can assume all your input files will be in proper format as...

  • Read the article below and in your own words, (1-2 sentences) what is the "true direction"...

    Read the article below and in your own words, (1-2 sentences) what is the "true direction" or right way to interpret nature, according to Bacon? True Directions Concerning the Interpretation of Nature (1620) Francis Bacon Those who have taken it on themselves to lay down the law of nature as something that has already been discovered and understood, whether they have spoken in simple confidence or in a spirit of professional posturing, have done great harm to philosophy and the...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • 1. Analyze the major challanges USB faced in the last 5 years, in your opinion, what were the cru...

    1. Analyze the major challanges USB faced in the last 5 years, in your opinion, what were the crucial factors in the banks downturn? 2. what are the main triggers to change the banks approach to communication and what is different today regarding the dealings and relationship to its share-and stakeholders? 3. How would you evaluate the constant replacement of the banks chairman and CEO? 4. in view of the future strategy of USB, what are your suggestions in order...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT