1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
2 years ago
15

• Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1= 500 kbps, R2

= 2 Mbps, and R3= 1 Mbps. o Assuming no other traffic in the network, what is the throughput for the file transfer? o Suppose the file is 4 million bytes. Dividing the file size by the throughput, roughly how long will it take to transfer the file to Host B? g
Computers and Technology
1 answer:
Marat540 [252]2 years ago
6 0

Answer:

It will take 64 seconds to transfer the file from Host A to Host B.

Explanation:

The throughput for this network is the link with the minimum rate from R1, R2 and R3.

Throughput = 500 kbps

Time taken to transfer file = File Size/Throughput

The units of both file size and throughput must be same so we will convert 4 million bytes into bits. (Note: 1 byte has 8 bits)

4000000*8 = 32000000 bits = 32 million bits

Time taken to transfer file = 32 million bits/500 kbps

                                           = 32000000/500000

Time taken to transfer file = 64 seconds

It will take 64 seconds to transfer the file from Host A to Host B.

You might be interested in
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
When talking about the physical elements of the internet, the term redundancy refers to:?
Sphinxa [80]
It refers to the physical elements of the internet
6 0
3 years ago
Look at the following Python code:
aliya0001 [1]

Ump will be assigned to word2

word1[0:3] gets all of the letters from index 0 to index 3 exclusive (that means index 3 is not included)

4 0
2 years ago
A species of snake lives in a rainforest. Which would be an adaptation for this
raketka [301]

Answer:

The Answer is D

6 0
3 years ago
Read 2 more answers
Find the gear ratio of the gear in the picture. <br><br> 25 points+brainliest
ankoles [38]

The gear ratios would look like A:B=1:9 and C:D=1:32 if you are just needing the gear teeth ratio. Not a lot of information to go off of from the question though

8 0
2 years ago
Other questions:
  • Write the definition of a method named printPowerOfTwoStars that receives a non-negative integer n and prints a string consistin
    10·1 answer
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • This stores a piece of data and gives it a specific name
    7·1 answer
  • Pls Help Me!!!!!!!!!!! It won’t work when I connect to ITunes!
    12·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • PLEASE HELP
    5·1 answer
  • Write a method that returns a version of the given array where all the 10's have been removed. The remaining elements should shi
    9·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Project light with a system of lenses used for projecting slides or film into a screen.
    5·1 answer
  • TO Cloud
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!