1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
7

Suppose two hosts, A and B, are separated by 7,500 kilometers and are connected by a direct link of R = 10 Mbps. Suppose the pro

pagation speed over the link is 2.5 x 10 8 meters/sec. Consider sending a large packet of 500,000 bits from Host A to Host B. How many milliseconds (ms) does it take before the receiver has received the entire 500,000-bit file?
Computers and Technology
1 answer:
Ann [662]3 years ago
3 0

Answer:

50 ms (milliseconds) will be taken in total to take the entire file by user.

Explanation:

In Computer networks, propagation delay is defined as the time in which a packet is sent from sender to receiver completely. It is computed by taking the ratio of link length and propagation speed.

We know that:

BDP(in bits) = total bandwidth (in bits/sec) * trip time(in sec)

Now according to given condition we have:

Bandwidth = R = 10 Mbps = 10,000,000 bps

BDP = 500,000 bits

For finding Propagation Delay:

Propagation Delay = BDP/ R

Propagation Delay = 500,000/10,000,000 sec

Propagation Delay = 0.05 sec

Converting in milliseconds:

Propagation Delay = 50 ms

Hence. the delay would be 0.05 seconds and in milliseconds they will be equal to 50 ms

You might be interested in
How many types of window in Qbasic​
Pachacha [2.7K]

Answer:

The QBasic Editor Screen has three parts. They are- Editor Window, Immediate Window and Output Window.

7 0
3 years ago
You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
galina1969 [7]
The answer is True bc it saves you time and is efficient
6 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Function of network security​
myrzilka [38]

Answer:ffffffffffffgggggg

Explanation:vvvc

5 0
3 years ago
If you want to change the speed of a layer's horizontal scrolling, what should you change?
kirill [66]

Answer: A; X coefficient

Explanation: Hope I helped out !

-Carrie

Ps. it would mean a lot if you marked brainliest

6 0
3 years ago
Other questions:
  • How do i build a supercomputer.?
    11·1 answer
  • Write a function called printEvens that prints all the even numbers between 2 and 20, inclusive. It will take no arguments and r
    6·1 answer
  • Hey, how is everyone????????????????????????????????
    8·2 answers
  • Which components exist in the contextual tab for tables called Design? Check all that apply.
    15·2 answers
  • Ideally, Internet of Things (IoT) devices have the ability to:
    14·1 answer
  • Type the numbers 1-50 and then type Computers and Technology twice type it once forward and once backwards.
    5·2 answers
  • What skills did Carl work on, and what steps did he take to reach his long term goals?<br>​
    10·1 answer
  • Question 2 of 10
    15·1 answer
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
  • Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction stor
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!