1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
11

Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro

pagation speed over the link is 2.5 * 108 meters/sec.How long does it take to send a 1,500,000 bit file, assuming it is sent continuously?
Computers and Technology
1 answer:
beks73 [17]3 years ago
6 0

Answer:

360 msec

Explanation:

Data provided in the question:

Distance between the two hosts = 15,000 kilometer

= 1.5 × 10⁷ m    [ ∵ 1 km = 1000 m ]

Transmission rate, R = 5 Mbps = 5 × 10⁶ bits per second

Propagation speed over the link = 2.5 × 10⁸ meters/sec

Size of file to be sent = 1,500,000 bit

Now,

Propagation delay (dprop)

= Distance ÷ Speed

= ( 1.5 × 10⁷ ) ÷ (2.5 × 10⁸)

= 0.06 sec

= 60 msec           [ ∵ 1 sec = 1000 millisecond ]

Transmission delay (dtrans)

= Size of file ÷ Rate of transmission

= 1500000 ÷ ( 5 × 10⁶ )

= 0.3 sec

= 300 msec

Therefore,

Time required for transmitting the file

= Propagation delay + Transmission delay

= 60 msec + 300 msec

= 360 msec

You might be interested in
Which task is most suitable for creating an algorithm?
Anna71 [15]
A.
-HomeTaey
(ask anytime)
if I get it wrong, sorry
8 0
3 years ago
Read 2 more answers
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blo
nydimaria [60]

Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, Explanation:

4 0
3 years ago
Spreadsheets: what is a column?
Travka [436]

Answer:

a group of cells stacked upon each other; vertical group

4 0
3 years ago
How do you strike through text in excel?
Valentin [98]
In the font options there is a checkbox for strikethrough. Same dialog as word, only there is no button in the ribbon for it. You could customize that by creating a custom group if you want to.
6 0
4 years ago
Other questions:
  • list and briefly explain two other Discovery / inventions that were necessary for the eventual development of the technology nee
    12·1 answer
  • Write a statement that computes the square root of a variable called discriminant
    11·1 answer
  • Which dialog box opens after selecting a cell in the list of prepared data, clicking the insert tab on ribbon and the clicking t
    6·1 answer
  • What is a tag in an HTML document?
    5·1 answer
  • A computer that no longer works after having minor repair work done to it may have been damaged by ____
    13·2 answers
  • If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
    13·1 answer
  • What term is used to describe the time it takes a signal to travel from one location to another on a network?
    13·1 answer
  • You are going to write a program for Computer test which will read 10 multiple choice questions from a file, order them randomly
    11·1 answer
  • Critics of media consumption
    10·2 answers
  • Anyone know what I’m supposed to do?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!