![Computers and Technology](/tpl/images/cats/informatica.png)
Computers and Technology, 01.03.2021 22:20, ariqueen
Create a protocol that will solve the problems you saw with Protocol 1 by doing some error-checking. The sender should be able to construct a single multi-packet message that is sent at once. Afterwards they can keep communicating to fix any errors in the transmission. Things to consider:
- How will the receiver know the order of the packets or if any are missing?
- How will the receiver request missing packets and what will the sender do in response?
- How will both sender and receiver know the full message arrived successfully?
![answer](/tpl/images/cats/otvet.png)
Answers: 2
Other questions on the subject: Computers and Technology
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 20:00, hannahliebl2000
Need asap write a short paper describing the history and differences between six sigma, waterfall, agile, and scrum models. understanding these models can give you a good idea of how diverse and interesting it development projects can be. describe what the rationale for them is and describe their key features. describe the history behind their development. at least 400 words
Answers: 1
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 22:30, kierafisher05
What is the most popular genre of video games?
Answers: 1
![image](/tpl/images/cats/informatica.png)
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 11:00, jolleyrancher78
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
Do you know the correct answer?
Create a protocol that will solve the problems you saw with Protocol 1 by doing some error-checking....
Questions in other subjects:
![Konu](/tpl/images/cats/obshestvoznanie.png)
![Konu](/tpl/images/cats/obshestvoznanie.png)
![Konu](/tpl/images/cats/en.png)
![Konu](/tpl/images/cats/mat.png)
Mathematics, 23.03.2020 23:04
![Konu](/tpl/images/cats/geografiya.png)
![Konu](/tpl/images/cats/ekonomika.png)
![Konu](/tpl/images/cats/ekonomika.png)
![Konu](/tpl/images/cats/mat.png)
![Konu](/tpl/images/cats/en.png)