1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
8

Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti

me units, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying your answer:
a. Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why?

b. Suppose that a packet-switched network is used and the only traffic in this network comes from such applications as described above. Furthermore, assume that the sum of the application data rates is less than the capacities of each and every link. Is some form of congestion control needed? Why?
Computers and Technology
1 answer:
grin007 [14]3 years ago
7 0

Answer:

a; circuit-switched network.

b; No, it does not need congestion control.

Explanation:

For A;

A circuit-switched network is a better option for this application. This is because of the fact that the application is made up of long sessions with smooth data transfer capacity needs.

The transmission rate is known, and does not transmit in short intervals(short signals), every application session can have a bandwidth reserved without significant bandwidth wastage.

Also, the overhead expenses of setting up and tearing down connections are canceled out over the extensive period of running an application session.

For B;

If the packet-switched network is used, and traffic in the network comes from the said application. Even if every applications transmit one or more network connections. Still, we already know that every connection has enough transmission capacity to handle majority of the application data rates, no congestion(insignificant queuing) will happen.

This goes to say that no congestion control will be needed given such broad-based connection.

You might be interested in
Translate the following pseudocode for randomly permuting the characters in a string into a C++ program.
Svetllana [295]

Answer:

d

Explanation:

salak sensin kolay gelsin

6 0
2 years ago
Which tab on the ribbon houses the sort functions?<br><br> Insert<br> Data<br> View<br> Home
irinina [24]

Answer:

data

Explanation:

got it right on edgenuity

6 0
2 years ago
3.1.5 Which network component connects a device to transmission media and allows the device to send and receive messages?
Rom4ik [11]

Answer:

Network Interface Card (NIC)

Explanation:

Also called Ethernet Card, the Network Interface Card (NIC) allows a computer or any device to make wired or wireless connections with other devices in a network. This connection made possible by the NIC allows the device to send and receive messages in the network.

An application of this is seen in Internet of Things(IoT) where devices communicate with one another. This is actually possible because all of the devices one way or the other have a network interface card.

8 0
2 years ago
What are the basic problem that my pc can have?
Lena [83]
A virus, malware, unplugged, used too much storage, etc.
5 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
Other questions:
  • Create a division formula.
    9·1 answer
  • Describe network in terms of the class computer lab
    14·1 answer
  • Computer with a domain name is called a
    7·1 answer
  • Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
    10·1 answer
  • When the CSS property of position is set to ____ it moves the element relative to its original position and allows other element
    10·1 answer
  • Data cannot be sorted or filterd accuratly if there are ________.
    12·1 answer
  • Complete the sentence.
    14·1 answer
  • Design a function that checks if a keyword exists in a given keyword tree and returns true if so and returns false otherwise. Af
    13·2 answers
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!