1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
15

Host A sends real time voice to Host B over a packet switched network. Host A first converts the analogue voice signal to a digi

tal signal at a rate of 64 kbps. Host A then creates packets of data where each packet contains 56 bytes. Once a packet is created by Host A, it is sent to Host B over a link that operates at a 2 Mbps transmission rate. The propagation delay is 10 milliseconds. (Remember to convert bytes to bits). How many seconds does it take to create a packet of data?
Computers and Technology
1 answer:
DiKsa [7]3 years ago
5 0

Answer:

Time required is 0.007 s

Explanation:

As per the question:

Analog signal to digital bit stream conversion by Host A =64 kbps

Byte packets obtained by Host A = 56 bytes

Rate of transmission = 2 Mbps

Propagation delay = 10 ms = 0.01 s

Now,

Considering the packets' first bit, as its transmission is only after the generation of all the bits in the packet.

Time taken to generate and convert all the bits into digital signal is given by;

t = \frac{Total\ No.\ of\ packets}{A/D\ bit\ stream\ conversion}

t = \frac{56\times 8}{64\times 10^{3}}          (Since, 1 byte = 8 bits)

t = 7 ms = 0.007 s

Time Required for transmission of the packet, t':

t' = \frac{Total\ No.\ of\ packets}{Transmission\ rate}

t' = \frac{56\times 8}{2\times 10^{6}} = 2.24\times 10^{- 4} s

You might be interested in
A camera on a tripod shows the ground floor of a skyscraper and then moves upward to show its entire length. what camera movemen
scZoUnD [109]

Answer:

A pedestal. It involves moving the camera upwards or downwards in relation to a subject.

8 0
3 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
Consider the expression 3 * 2 ^ 2 < 16 5 AndAlso 100 / 10 * 2 > 15 - 3. Which operation is performed second?
miss Akunina [59]

Answer:

In the first expression

3 * 4 will be performed second.

In the second expression

10* 2  will be performed second.

Explanation:

In many programming language, there is an operator precedence where the operator (e.g. +, - , * , / etc) will be executed following a specific order. For example, the operator ^ which denotes power will always be executed prior to * or /    and if / and * exist in the same expression, the operator positioned at the left will be executed first.

Hence, in the expression 3*2^2 < 16 , 2 will be powered to 2 (2^2) first and then only multiplied with 3.

In the expression 100 / 10 * 2 > 15 - 3,  100 will be divided by 10 and then only multiplied with 2.

7 0
4 years ago
One disadvantage of online information sharing is that:
zubka84 [21]

Answer:

its b i just took the test

Explanation:

3 0
3 years ago
Read 2 more answers
Topic: Video Games.
Butoxors [25]

Answer:

Fire Emblem

Explanation:

4 0
3 years ago
Other questions:
  • What device can boost an analog signal? a digital signal?
    12·1 answer
  • An AM index between 0 and 1 indicates what? a. the AM signal is very small and will not be detected by the receiver b. distortio
    12·1 answer
  • Access data is _______ in a Word document.
    10·1 answer
  • What is good prossesser
    15·2 answers
  • When trying to work efficiently, how should you prioritize your tasks? (Site 1)
    8·1 answer
  • The span was so long, the height so great, and the enterprise likely to be so costly, that few thought of it as something begun
    9·2 answers
  • "If possible, always bring print-outs of your slides for your audience
    7·2 answers
  • What is lossless compression
    6·2 answers
  • What is the protocol for getting to the Web?
    9·2 answers
  • Who would win in a fight, Noble 6 from halo reach or Master Chief??
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!