1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
15

• Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1= 500 kbps, R2

= 2 Mbps, and R3= 1 Mbps. o Assuming no other traffic in the network, what is the throughput for the file transfer? o Suppose the file is 4 million bytes. Dividing the file size by the throughput, roughly how long will it take to transfer the file to Host B? g
Computers and Technology
1 answer:
Marat540 [252]3 years ago
6 0

Answer:

It will take 64 seconds to transfer the file from Host A to Host B.

Explanation:

The throughput for this network is the link with the minimum rate from R1, R2 and R3.

Throughput = 500 kbps

Time taken to transfer file = File Size/Throughput

The units of both file size and throughput must be same so we will convert 4 million bytes into bits. (Note: 1 byte has 8 bits)

4000000*8 = 32000000 bits = 32 million bits

Time taken to transfer file = 32 million bits/500 kbps

                                           = 32000000/500000

Time taken to transfer file = 64 seconds

It will take 64 seconds to transfer the file from Host A to Host B.

You might be interested in
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blo
nydimaria [60]

Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, Explanation:

4 0
3 years ago
What type of memory or storage device is prone to losing data if the power goes out?
Veseljchak [2.6K]
The answer is (c.) a DDR SDRAM module.

DDR SDRAM stands for Double data rate synchronous dynamic random-access memory. It is a form of temporary data storage in a computer. So when it comes to power down, the data stored in this RAM is most likely to lose.
7 0
3 years ago
Consider the operation of deleting the root of a binary search tree. if the root has one child, then ________.
PSYCHO15rus [73]

The reference to the root of the tree should be set to null

<h3>Can the root of a binary tree be null?</h3>
  • Only the subtrees are nulled out, the root always remains and will never be set to null.
<h3>What is null root?</h3>
  • null-, root. -null- comes from Latin, where it has the meaning "none; not one.
  • '' This meaning is found in such words as: annul, null, nullify.

To learn more about it, refer

to brainly.com/question/24448358

#SPJ4

4 0
2 years ago
True or false
ICE Princess25 [194]
1. True
2. Usually true, but it depends on the search engine you're using.  For example, Google lets you search for several words without commas.
3 0
3 years ago
What does "&amp;&amp;" mean?
Leviafan [203]

Answer:

And

Explanation:

& is a simplified version of and

3 0
3 years ago
Read 2 more answers
Other questions:
  • To get revenge on the pizza parlor burning his pizza and not reimbursing him for it, David returned to the pizza parlor after-ho
    9·2 answers
  • Mobile devices need to work within limited screen space .
    11·1 answer
  • Două numere a și b sunt numite generatoare ale unui număr natural n dacă a∙b+[a/b]=n, unde s-a notat cu [c] partea întreagă a nu
    7·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    8·1 answer
  • one_diff(a?): Description: Determine if there is exactly one character different between exactly two strings. Parameters: Determ
    5·1 answer
  • Write a program to define a variable size array, ask the user to enter the size of array and its elements. Then search whether a
    6·1 answer
  • Question #1
    9·2 answers
  • Write a function named parts that will take in as parameters the dimensions of the box (length, width, and height) and the radiu
    12·1 answer
  • How is your mental health as you're returning to school virtually or in
    13·1 answer
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!