1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
15

A source A producing fixed-length cells is required to use a Token Bucket Traffic Shaper (TBTS) of bucket capacity b=20 cell tok

ens and token feed rate r=40 tokens/sec, followed by a FIFO buffer with output read rate (peak rate) limited to q=120 cells/sec. The output is A’s flow into the network. What is the long-term average cell rate for this flow?

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
6 0

Answer:

Please find the detailed answer as follows:

Explanation:

Long-term average cell rate is also called as sustained cell rate(SCR). It can be defined as the maximum average cell rate in a log time period(T).

The relation among the SCR, Average cell rate and Peak cell rate is as follows:

Avg.cell rate ≤ SCR ≤ PCR

If the source producing fixed-length cells at constant rate, then the long-term average cell rate will be same as peak cell rate(PCR).

You might be interested in
What is the output of the below Java program?
patriot [66]

Answer:

If you fix your program: instead of "while (a=4)" you will have: while(a<4)

It wil print:

> 123

Explanation:

You can check the output of that kind of programs in online repl consoles e.g: https://repl.it/languages/java10

3 0
3 years ago
Type of file containing instructions that tell your computer how to perform ___
julsineya [31]

Answer:

A)File

B)Native

C)Extension

D)File size

Explanation:

6 0
3 years ago
Find the smallest value of n such that LCM of n is 15 is 45​
raketka [301]

Answer:

n=9

Explanation:

LCM(n,15)=45

LCM(9,15)=45

8 0
3 years ago
Malware is any malicious software installed on a computer or network without the owner’s knowledge.
Naya [18.7K]

Answer: True

Explanation: Malware is literally short for malicious software. The name that is given to any type of software that could harm a computer system or collect a user's data.

Hope it helped please mark as brainliest!

8 0
3 years ago
What is the purpose of the backoff on Ethernet networks?
stellarik [79]

Answer: Please see below as the answer is self-explanatory.

Explanation:

In the original Ethernet standard, IEEE 802.3, the method used to deliver packets within a Ethernet network, is called CSMA/CD, and the acronym includes all the Ethernet features in brief.

Let's explain the different parts of the acronym.

CSMA= Carrier Sense Multiple Access.

This means that when any computer in the network (with no privileges for nobody) has a packet to transmit, it first "listen"if the network is idle. If it is the found condition, deliver the packet, and wait for an acknowledgement.

If past a given time, the ACK is not received, assumes that the packet was lost, due to a collision with another packet coming from another computer (this can happen because the packets don't travel instantaneously from one host to another, so one machine could have started to transmit before the another one could sense this fact).

This process is described by the other part of the acronym:

CD = Collission Detection

In order to avoid this type of problem, before trying to resend the packet, it waits some time, which is called "backoff".

This time increases exponentially each time that it is not possible to send a packet successfully, in order to try to find a moment in which finally the network be clear.

8 0
4 years ago
Other questions:
  • Create a different version of the program that: Takes a 3-digit number and generates a 6-digit number with the 3-digit number re
    14·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • Does it matter if watch comes without box and papers
    10·1 answer
  • When do you use FTP?
    10·2 answers
  • A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a s
    6·2 answers
  • When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibilit
    7·1 answer
  • Which web browser was created by Google?
    5·2 answers
  • Hannah wants to write a book about how scientists and society interact, and she has generated ideas for chapters. Which chapter
    13·1 answer
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • Which cyber protection condition establishes a protection.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!