1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
12

Suppose there is exactly one packet switch between a sending user and a receiving user. The transmission rates between the sendi

ng user and the switch and between the switch and the receiving user are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L?
Computers and Technology
1 answer:
Paha777 [63]3 years ago
6 0

Answer:

L(\frac{1}{R_1}+\frac{1}{R_2}  )

Explanation:

R_1 is the transmission rates between the sending user and the switch while R_2 is the transmission rates between the switch and the receiving user and the length of the packet is L

Considering no propagation delay the time taken to transmit the packet from the sending user to the switch is given as:

t_1=\frac{L}{R_1}

the time taken to transmit the packet from the switch to the receiving user is given as:

t_2=\frac{L}{R_2}

therefore the total end-to-end delay to send a packet is:

t=t_1+t_2=\frac{L}{R_1}+\frac{L}{R_2} =L(\frac{1}{R_1}+\frac{1}{R_2}  )

You might be interested in
The movie polar express was critically acclaimed due to the unbelievably lifelike movements of Tom Hanks character
Fed [463]
I think it is greyhound
6 0
3 years ago
Which type of application architecture has a logic tier
LuckyWell [14K]

Answer:

hi

Explanation:

7 0
3 years ago
Read 2 more answers
Help With Sims 4
Norma-Jean [14]

You should probably try removing it one by one if you dont want to get rid of all of it. it might take some time but,,,,

4 0
3 years ago
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
how old is the letter 3 on its 23rd birthday when your car turns 53 and your dog needs gas and your feet need lave then when is
forsale [732]

Answer:

ummm...idr.k..u got me....wat is it

Explanation:

8 0
3 years ago
Other questions:
  • Nancy finds it difficult to locate emails in her Inbox. What action should she take to locate a particular type of email instant
    11·2 answers
  • What is a “spoof” of an ad ?
    8·2 answers
  • Can embedded computers automate security so you can lock and unlock doors remotely
    15·1 answer
  • Complete the statement below with the correct term.
    12·2 answers
  • you have obtained a program under development to test on your computer. While you are using the program, it crashes with a messa
    9·1 answer
  • Write a program that dynamically allocates an array large enough to hold a user-defined number of test scores. Once all the scor
    5·1 answer
  • Eric wants your help in remembering which of the following options corresponds to a dialog box that alerts the user to an error
    15·1 answer
  • Need the answer for this code hs will give brainly
    7·1 answer
  • A digital presence created online by an individual or organization using a digital device is called a identity.
    7·1 answer
  • Answer this if you can help me!
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!