Computers and Technology

Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B. Required:
a. Express the propagation delay d(prop) interms of L and R.
b. Determine the trnasmission time of the packet d(trans) in termsof L and R.
c. Ignoring processing and queing delays obtain an expression forthe end to end delay.
d. Supose Host A begins to transmit packet at time t=0 . At timet=d(trans) where is the last bit of the packet.
e. Suppose d(prop)is greater than d(trans) . At time t= d(trans)where is the first bit of the packet
f. Suppose d(prop)is less than d(trans) . At time t= d(trans) whereis the first bit of the packet
g. Suppose s=2.5* 10power(8), L=100 bits and R=28 kbps. find thedistance m so tha d(prop) equals d(trans).

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 21:30, Cheflulu5727
Write a function named printfloatrepresentation(float number) that will print the floating point representation of a number using the format given below. (sign bit) exponent in binary (assumed bit).significandfor example if the number passed an argument is 71 yourprogram should print (0) 10000101 (1).00011100000000000000000similarl y if the number passed to the function as argument is -71 the program should print (1) 10000101 (1).00011100000000000000000
Answers: 3
image
Computers and Technology, 24.06.2019 00:30, rustjallison9928
Asecurity policy is a a. set of guidlines b. set of transmission protocols c. written document d. set of rules based on standards and guidelines
Answers: 2
image
Computers and Technology, 24.06.2019 07:30, Isabellawuzhere
Aproject involves many computing systems working together on disjointed task towards a single goal what form of computing would the project be using
Answers: 3
image
Computers and Technology, 24.06.2019 19:20, boyancecristina
Which command suppresses the visibility of a particular row or column in a worksheet?
Answers: 1
Do you know the correct answer?
Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts ar...

Questions in other subjects: