1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
15

Host A sends real time voice to Host B over a packet switched network. Host A first converts the analogue voice signal to a digi

tal signal at a rate of 64 kbps. Host A then creates packets of data where each packet contains 56 bytes. Once a packet is created by Host A, it is sent to Host B over a link that operates at a 2 Mbps transmission rate. The propagation delay is 10 milliseconds. (Remember to convert bytes to bits). How many seconds does it take to create a packet of data?
Computers and Technology
1 answer:
DiKsa [7]3 years ago
5 0

Answer:

Time required is 0.007 s

Explanation:

As per the question:

Analog signal to digital bit stream conversion by Host A =64 kbps

Byte packets obtained by Host A = 56 bytes

Rate of transmission = 2 Mbps

Propagation delay = 10 ms = 0.01 s

Now,

Considering the packets' first bit, as its transmission is only after the generation of all the bits in the packet.

Time taken to generate and convert all the bits into digital signal is given by;

t = \frac{Total\ No.\ of\ packets}{A/D\ bit\ stream\ conversion}

t = \frac{56\times 8}{64\times 10^{3}}          (Since, 1 byte = 8 bits)

t = 7 ms = 0.007 s

Time Required for transmission of the packet, t':

t' = \frac{Total\ No.\ of\ packets}{Transmission\ rate}

t' = \frac{56\times 8}{2\times 10^{6}} = 2.24\times 10^{- 4} s

You might be interested in
One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
mote1985 [20]

Answer: True

Explanation: Security management firm is the organization that provides protection to the system, functions,data, people etc of any particular business organization.They are highly capable of the problem avoidance, management of risk and other such issues.

The monitoring of the security done by the people and devices of the security management firm are more reliable and assured due to the expert skill they persist in the security field. Thus, the given statement is true.

8 0
3 years ago
Read 2 more answers
True or False(T or F): Point-and-shoot cameras have only 1 lens. *
liq [111]

Answer:

True

Explanation:

Technically speaking they only have one.

7 0
3 years ago
What type of control structure is the default method of the computer reading code?
Delicious77 [7]
The answer is Selection. Hope this helped you
8 0
4 years ago
You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
Rudiy27

Answer:

<em>A. check box </em>

Explanation:

A check box, selection box, or tick box <em>is a small immersive box that the user can switch to demonstrate an affirmative or negative choice</em>.

It is often observed in applications and operating systems ' HTML input forms, dialog boxes, and GUIs.

A check mark appears inside the box when clicked to signify an affirmative (yes) option. The check mark will vanish when clicking again, suggesting a negative option (no).

6 0
3 years ago
All cells in row 2 through 5 are referred as 2:5 true or false
Simora [160]
<h3>Answer:</h3><h2>TRUE</h2>

Explanation:

BRAINLIEST PLSSSSSSSSSSSSSSSSSSS

8 0
3 years ago
Other questions:
  • Which best defines the term patch?
    12·1 answer
  • HEY DO U LIKE TRAINS!
    7·1 answer
  • Write a sentence about a mineral you use and how you use it
    12·1 answer
  • Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
    15·1 answer
  • Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
    12·1 answer
  • Write another function to convert a value to its word equivalent leveraging the following tuple - o Number = (‘One’, ‘Two’, … ‘N
    10·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H
    15·2 answers
  • Copying materials from a source text without using is<br> considered plagiarism<br> ?
    5·1 answer
  • (Just wondering and for fun) What can humanity do to survive after the universe dies? Assuming we have advanced tech and there a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!