1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
11

In case of rdt 3.0 Stop and Wait, suppose we send a packet of 1KB through 1 Gbps link and RTT=20 msec. Find the sender utilizati

on? Find the sender throughput?
Computers and Technology
1 answer:
Mamont248 [21]3 years ago
5 0

Answer:

a. Utilization =  0.00039

b. Throughput = 50Kbps

Explanation:

<u>Given Data:</u>

Packet Size = L = 1kb = 8000 bits

Transmission Rate = R = 1 Gbps = 1 x 10⁹ bps

RTT = 20 msec

<u>To Find </u>

a. Sender Utilization = ?

b. Throughput = ?

Solution

a. Sender Utilization

<u>As Given </u>

Packet Size =  L = 8000 bits

Transmission Rate = R = 1 Gbps = 1 x 10⁹ bps

Transmission Time = L/R = 8000 bits / 1 x 10⁹ bps = 8 micro-sec

Utilization =  Transmission Time / RTT + Transmission Time

                 =  8 micro-sec/ 20 msec + 8 micro-sec

                 =  0.008 sec/ 20.008 sec

Utilization =  0.00039

b. Throughput

<u>As Given </u>

Packet Size = 1kb

RTT = 20ms = 20/100 sec = 0.02 sec

So,

Throughput = Packet Size/RTT = 1kb /0.02 = 50 kbps

So, the system has 50 kbps throughput over  1 Gbps Link.

You might be interested in
Is prediction harmful or not , why​
Marrrta [24]

Answer:

It's Not At All Because It's Just Like Yku Thinking Of Something

Explanation:

not at all

8 0
3 years ago
"So far this month you have achieved $100.00 in sales, which is 50% of your total monthly goal. With only 5 more workdays this m
Rus_ich [418]

Answer:

$20 per day for next 5 working days.

Explanation:

if 50% is $100.00 another $100 need to achieve in 5 days.

100/5=20

3 0
3 years ago
Read 2 more answers
A loop should output 1 to n. If n is 5, the output is 12345. What should XXX and YYY be? Choices are in the form XXX / YYY. cin
Alona [7]

Answer:

i = 0; i < n / i + 1

Explanation:

Given that:

a loop output 1 → n

if n = 5

output = 12345

n = scnr.nextInt();

for (XXX;  i++)

{

System.out.printIn(YYY);

}

XXX / YYY is i = 0; i < n / i + 1

5 0
3 years ago
Read 2 more answers
Which sentences use antonyms to hint at the meaning of the bolded words? Check all that apply.
Leto [7]

Answer:

dunno

Explanation:

7 0
3 years ago
Which security option should be used to ensure the integrity and validity of an Access database?
Fynjy0 [20]

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

<em>Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)</em>

3 0
3 years ago
Read 2 more answers
Other questions:
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • what is the software that controls the storage, retrieval and manipulation of database stored in a database
    14·1 answer
  • This toolbar has icons representing the application's basic operations such as Save and Copy. Drawing Formatting Standard Task
    11·2 answers
  • Write a recursive method named binarySearch that accepts a sorted array of integers and an integer target value and uses a recur
    6·1 answer
  • ____________ is a widely accepted international best practices framework for implementing information systems security.
    12·1 answer
  • PLS ANSWER ASAP!
    9·1 answer
  • A(n) _________ is a lan that uses the same technologies as the internet but is provided to invited users outside the organizatio
    12·1 answer
  • What is the scope of numC?
    8·2 answers
  • what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
    11·1 answer
  • Which web-authoring software enables users to create sophisticated web pages without knowing any html code?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!