1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
2 years ago
15

• Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1= 500 kbps, R2

= 2 Mbps, and R3= 1 Mbps. o Assuming no other traffic in the network, what is the throughput for the file transfer? o Suppose the file is 4 million bytes. Dividing the file size by the throughput, roughly how long will it take to transfer the file to Host B? g
Computers and Technology
1 answer:
Marat540 [252]2 years ago
6 0

Answer:

It will take 64 seconds to transfer the file from Host A to Host B.

Explanation:

The throughput for this network is the link with the minimum rate from R1, R2 and R3.

Throughput = 500 kbps

Time taken to transfer file = File Size/Throughput

The units of both file size and throughput must be same so we will convert 4 million bytes into bits. (Note: 1 byte has 8 bits)

4000000*8 = 32000000 bits = 32 million bits

Time taken to transfer file = 32 million bits/500 kbps

                                           = 32000000/500000

Time taken to transfer file = 64 seconds

It will take 64 seconds to transfer the file from Host A to Host B.

You might be interested in
Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The
Zigmanuir [339]

Answer: The graphical user interface

Explanation:

The graphical user interface (GUI) is a form of user interface that allows user of a device interacts with it through graphical icons or cursors, text based commands or audio commands. The functionality of a GUI is a consequence of the direct manipulation of its graphical elements. Specialized GUIs that allows for speech based commands are called natural user interfaces.

4 0
3 years ago
Describe Ms word environment.​
Alexeev081 [22]

On Microsoft Word, you can edit your Word.... You can add pictures, do journals, do menus, and stuff like that... You can add color to text, make lists, add shapes to your Word, etc...

8 0
3 years ago
A search engine that crawls uses
RoseWind [281]

Answer:

web crawlers or spider software

Explanation:

A search engine that crawls uses the web crawler or the spider software. And it also uses the server side JavaScript based crawlers and programming languages like Python and PHP. The search engine finds the content category through the meta keywords and directs the page to the index. The index contains details of similar types of pages, And each page has one category, and if category is not found which is rarest, a new category is being created.

7 0
3 years ago
How is a WAN different from a LAN?
RSB [31]

<em>A</em><em> </em><em> </em><em>WAn</em><em> </em><em>(</em><em> </em><em>Wide</em><em> </em><em>Area</em><em> </em><em>Network</em><em> </em><em>)</em><em> </em><em>is</em><em> </em><em>made</em><em> </em><em>up</em><em> </em><em>of</em><em> </em><em>LANS</em><em> </em><em>(</em><em> </em><em>Local</em><em> </em><em>Area</em><em> </em><em>Network</em><em>)</em><em>…</em><em>…</em><em>…</em><em>…</em>

4 0
2 years ago
Please, ignore
Komok [63]
Abhheoorioooooohhhhh omg
3 0
3 years ago
Read 2 more answers
Other questions:
  • An undesirable jagged appearance is referred to as
    7·2 answers
  • Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
    9·1 answer
  • Double clicking a word selects the entire word?
    10·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is lis
    13·1 answer
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform addr
    8·1 answer
  • Explain how to utilize the computer in rooms management.​
    13·1 answer
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!