1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
11

How long does it take to send a 8 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmiss

ion rate = 44.2 Gbps. Network is FDM, with 10 permitted users, each with an equal bandwidth share. A link connection requires a setup time of 85.1 miss. Your answer should be in milliseconds (ms) with one decimal place, and without the unit
Computers and Technology
1 answer:
levacccp [35]3 years ago
6 0

Answer:

Given values are:

File size= 8 MiB

Total Link Transmission Rate = 44.2 Gbps

Users = 10

Setup Time=85.1 ms

We know that

1 MiB = 2^{20} = 1048576 bytes

1 MiB = 2^{20}x8= 8388608 bits

8MiB= 8388608x8 = 67108864 bits

So,

Total Number of bits = 67108864 bits

Now

Total link transmission rate = 44.2 Gbps

1 Gbps = 1000000000 bps

44.2 Gbps = 44.2 x 1000000000 =44200000000 bps

For FDM Network

Transmission rate for one time slot = \frac{44200,000,000}{10} bits per second

Transmission rate for one time slot = 4420000000 bit per second

Transmission rate for one time slot = \frac{44200,000,000}{10^{3} .10 }

   in milliseconds

Transmission rate for one time slot in =4420000 bits per millisecond

Now,

Total time taken to transmit 8 MiB of file = \frac{Total Number of Bits}{Transmission Rate}

Total time taken to transmit 8 MiB of file = \frac{67108864}{4420000}

As setup time is also given So,

Total time = Setup time + Transmission Time

Total time = 85.1 + 15.18

Total time = 100.2 milliseconds

Hence it is the time required to send a 8MiB of file from Host A to Host B.

I hope it will hep you!

You might be interested in
When should students practice netiquette in an online course? Check all that apply.
Elden [556K]

Answer:

tienesrazon  

Explanation:

6 0
3 years ago
Destinguish between qualitative data and quantitave
Elden [556K]

For quantitative data, notice the root word 'quantity', which focuses on the amount of something, for example, there are more players on team a than on team b.

For qualitative data, notice the root word quality. Qualitative data focuses on the condition or state of something rather than the amount, for instance, player a does not run as fast as player b.

Hope this helped.

4 0
3 years ago
Who do politicians listen to?
horrorfan [7]

Answer:

they dont realy listen to anybody

Explanation:

6 0
4 years ago
William wants to create a document using a DTP. What time-saving techniques can he use?
Verdich [7]
Projective ecodynamic blueglocose
6 0
4 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Other questions:
  • For microsoft word tabs are very useful when you want to
    13·1 answer
  • Two of the child elements of the page body are a navigation list with the ID #hole_list and an article element containing inform
    7·1 answer
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • This type of connection uses radio waves to connect devices on a network.A) DataB) EthernetC) RouterD) wifi
    15·1 answer
  • Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter code
    13·1 answer
  • What is the speed of Android operating system?
    6·1 answer
  • What is the purpose of this parallelogram shape in a flowchart?
    15·1 answer
  • How does the technology affect you daily living? Give situations where you use technology and how it helped you.​
    5·1 answer
  • Which key must be pressed in addition to clicking on a hyperlink for it to be followed?
    7·1 answer
  • 1. What is the difference between a group and a topic?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!