menu
bartleby
search
close search
Hit Return to see all results

Consider the sender A transmits 12 data packets to B using stop wait protocol. If every3rd packet is lost while transmission, then how many packets will the sender A has tosend to B in total?a) 18b) 15c) 16d) 17

Question
Consider the sender A transmits 12 data packets to B using stop wait protocol. If every
3rd packet is lost while transmission, then how many packets will the sender A has to
send to B in total?
a) 18
b) 15
c) 16
d) 17
help_outline

Image Transcriptionclose

Consider the sender A transmits 12 data packets to B using stop wait protocol. If every 3rd packet is lost while transmission, then how many packets will the sender A has to send to B in total? a) 18 b) 15 c) 16 d) 17

fullscreen
check_circleAnswer
Step 1

Analysis:

In stop and wait protocol, the data packets will be transmitted as follows:

  • 1, 2, 3, 3, 4, 5, 5, 6, 7, 7, 8, 9, 9, 10, 11, 11, 12

Here, the lost packets are highlights in “bold” and they are “3”, “5”, “7”, &ldquo...

Want to see the full answer?

See Solution

Check out a sample Q&A here.

Want to see this answer and more?

Our solutions are written by experts, many with advanced degrees, and available 24/7

See Solution
Tagged in

Engineering

Computer Engineering

Computer Networks

Related Computer Engineering Q&A

Find answers to questions asked by student like you

Show more Q&A add
question_answer

Q: What are the mantissa and exponent values if 6.75 is represented in 8-bit binary floating-point repr...

A: Conversion of decimal to 8-bit floating point representation:Step 1: Convert the integer part of the...

question_answer

Q: Consider a 4-way set associative cache made up of 64-bit words. The number of words per line is 8 an...

A: Cache size:The cache size can be calculated using the following formula:

question_answer

Q: I need help figuring out how to summarize the content and format of a written technical report.

A: While we are writing a technical report we need to figure out the following points.The title page of...

question_answer

Q: Consider the client A sends the data of 12 bytes to the sender B using the UDP. What is the efficien...

A: Efficiency:In User Datagram Protocol (UDP), the formula for computing efficiency of the transmission...

question_answer

Q: Describe two concepts for an autonomous transportation and/or delivery that replaces manned systems....

A: Autonomous transportation is the evolution of transport where the vehicles are connected to create a...

question_answer

Q: Provide a physical block diagram for a concept of an autonomous transportation and/or delivery that ...

A: Autonomous Vehicle Hardware:The hardware components allow the car to complete such tasks as seeing t...

question_answer

Q: how do I Write a String constant consisting of exactly 5 exclamation marks. in python language

A: String Constants: The string constant is nothing but the sequences of characters that is used as dat...

question_answer

Q: Why is binary search algorithm better than sequential search?

A: Sequential search algorithm involves visiting each and every element of the list of elements and see...

question_answer

Q: Which of the following statements are true? In PC relative addressing mode, the PC and constant need...

A: In PC relative addressing mode, the effective or branch address is obtained by adding offset to PC t...

Sorry about that. What wasn’t helpful?