1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
14

Compute the sender utilization for this protocol in the case the roundtrip time between sender and receiver is 7 ms, the network

throughput is 1Mbps and each packet has a size of 1500 bytes
Computers and Technology
1 answer:
denis23 [38]3 years ago
8 0

Given Information:

Round-trip time = RTT = 7 ms

Network throughput = 1 Mbps

Packet size = 1500 bytes

Required Information:

Sender utilization = U = ?

Answer:

Sender utilization = 63.16%

Explanation:

The transmission delay is given by

T = Packet size/Network throughput

T = 1500*8 bits/1x10⁶ bits/s

T = 12x10⁻³  sec

The Propagation delay is given by

Pd =RTT/2

Where RTT is the round trip time

Pd = 7x10⁻³/2

Pd = 3.5x10⁻³ sec

The sender utilization is

U = 1/ (1 + 2*(Pd/T))

U = 1 / (1 + 2*(3.5x10⁻³/ 12x10⁻³))

U = 0.6316

U = 63.16%

Therefore, the sender utilization or efficiency for this protocol is 63.16% which is basically the average traffic over this link or in other words the link has been used for 63.16% of the time.

You might be interested in
The February Revolution occurred in January.<br><br><br> True<br> False
zimovet [89]
The answer would be false. 
7 0
3 years ago
Read 2 more answers
Where is the fill handle located
Ronch [10]
The fill handle will appear as a small square in the bottom-right corner of the selected cell(s). Click, hold, and drag the fill handle until all of the cells you want to fill are selected. Release the mouse to fill the selected cells
4 0
3 years ago
Betty is applying for a software analyst role. which field should she specialize in? information technology resource management
Schach [20]
Since Betty is applying for a software analyst role, she should specialize in INFORMATION TECHNOLOGY.

<span>Information technology or IT is defined as the study or use of systems in computers and telecommunications for storing, retrieving, and sending information.
</span>
Betty's role as a software analyst  would be to:
1) <span> study the </span>software<span> application domain,
2) prepare </span>software<span> requirements and specification (</span>Software<span> Requirements Specification) documents.
3) be the link between the software users and software developers.</span>
5 0
4 years ago
Read 2 more answers
The collection of all component frequencies iscalled _____________
yKpoI14uk [10]

Answer:

The answer is Frequency Spectrum.

Explanation:

The frequency spectrum is range of all component frequencies.It contains all the waves which are as following:-

Gamma Rays

X-Rays

Ultraviolet

Visible light.

Infrared

Micro wave

Radio wave

These all waves have their range of frequencies.The waves that are visible to us is only the visible light.

4 0
3 years ago
Which of the following is a bullet type in the &lt;ul&gt; tag?
dybincka [34]

Answer:

That would be (d) All of these. I hope this helps you!

8 0
3 years ago
Other questions:
  • Christine wants to send a quick communication to all department managers. She should send a _____. report
    13·2 answers
  • Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
    13·1 answer
  • What is the name for a partition that has been formatted and assigned a drive letter?
    8·1 answer
  • What is the purpose of an internet protocol address (ip address)? it specifies whether a computer is using a broadband network o
    10·1 answer
  • Evaluate the following expression with precedence of operator:<br> ​ X = 2* 3/ 5 + 10 //3 – 1
    13·1 answer
  • write a java program using a do while loop to prompt the user to enter a password. The user should be prompted to enter the pass
    5·1 answer
  • . List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
    5·1 answer
  • What are acenders? What are decenders?
    10·2 answers
  • What is an advantage of using a fully integrated cloud based data analytics platform
    5·1 answer
  • The user can close all the programs if he closes the open virtual desktop true false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!