1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
12

In this problem we consider sending real-time voice from Host A to Host B over a packet-switched network (VoIP). Host A converts

analog voice to a digital 64 kbps bit stream on the fly. Host A then groups the bits into 56-byte packets. There is one link between Hosts A and B; its transmission rate is 4 Mbps and its propagation delay is 18 msec. As soon as Host A gathers a packet, it sends it to Host B. As soon as Host B receives an entire packet, it converts the packet's bits to an analog signal. How much time elapses from the time a bit is created (from the original analog signal at Host A) until the bit is decodes (as part of the analog signal at Host B)?
Computers and Technology
1 answer:
Minchanka [31]3 years ago
5 0

Answer:

<u>The total time elapsed from the time a bit is created (from the original analog signal at Host A) until the bit is decoded (as part of the analog signal at Host B is </u><u>25.11 ms</u>

Explanation:

Host A first converts the analog signal to a digital 64kbps stream and then groups it into 56-byte packets. The time taken for this can be calculated as:

time taken 1= \frac{Packet Size in Bits}{Bit Rate}

                 = (56 x 8) bits / 64 x 10³ bits/s

                 = 7 x 10⁻³s

time taken 1= 7 ms

The transmission rate of the packet from Host A to Host B is 4 Mbps. The time taken to transfer the packets can be calculated as:

time taken 2= (56 x 8) bits / 4 x 10⁶ bits/s

                    = 1.12 x 10⁻⁴ s

time taken 2= 112 μs

The propagation delay is 18 ms.

To calculate the total time elapsed, we need to add up all the time taken at each individual stage.

<u />Time_{total}<u> = Time taken 1 + Time taken 2 + Propagation Delay</u>

                 = 7 ms + 112 μs + 18 ms

                 = 0.025112 s

Time_{total} = 25.11 ms

You might be interested in
Why do some people argue that tech companies like Apple should do more to address the smartphone addiction problem?
Neko [114]

Answer:

Cause It Will Help Make A Fix For The Issue

Explanation:

Does This Help?

5 0
3 years ago
I have a message for anyone reading this
uysha [10]

Answer:zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

Explanation:

4 0
2 years ago
Plzz help will mark brainliest
vlabodo [156]

Answer:

11. 3 dimensions

12. ( i believe its number 3)

13. 2 option

14. Natural Light

15. Development

Explanation:

7 0
3 years ago
State the stages step by step in the production of plastic​
Ahat [919]

Hello!!

Answer:

Plastic extrusion is the process through which plastic is heated and forced through a heated chamber by a screw.

Molding is the process of forcing plastic through a die to form the final shape of a product.

Cooling: The plastic extruded is chilled.

Spool or cut: The continuous form is either spooled or cut into lengths.

Mold construction: Small plastic pellets are melted and moulded into a hollow tube known as a parison or preform (depending on the blow molding subtype).

Molding: The parison is clamped into a mold and inflated with pressured air until it adopts the shape of the mold's interior.

Cooling and ejection: The item cools in the mold until it is firm enough to be expelled.

6 0
2 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Other questions:
  • How to burn mp3 on dvd
    13·2 answers
  • TCP will guarantee that your packets will arrive at the destination, as long as the connection is still established. True False
    11·1 answer
  • One of the newest electronic conveniences is the ________, which can serve as a credit card, a debit card, and even unlock doors
    12·1 answer
  • The process known as "bitmapping" is defined as information in _____. PLEASE HELP FAST
    11·1 answer
  • The linear programming ingredient or blending problem model allows one to include not only the cost of the resource, but also th
    14·1 answer
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • What are the steps to open the Custom AutoFilter dialog box?
    5·2 answers
  • burger hut is trying to decide if it can receive money from the government for providing employees with insurance .
    6·1 answer
  • Help? Can you explain what this mean?
    7·1 answer
  • ZipCar uses cutting edge wireless technology combined with sophisticated data management and security techniques to assure that
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!