1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
8

If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the cha

nnel (the utilization), given that the round-trip-time (RTT) for a router is 20ms when sending 2000 Byte packets ( a byte is 8 bits) at 500Mega bits per second (Mbps)
Computers and Technology
1 answer:
olganol [36]3 years ago
5 0

Answer:

This question is incomplete, here is the complete question;

If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the channel (the utilization), given that the round-trip-time (RTT) for a router is 20ms when sending 2000 Byte packets ( a byte is 8 bits) at 500Mega bits per second (Mbps)? Answer to the nearest tenth of a microsecond. Recall that the formula for utilization U is L/R / (L/R + RTT). Be careful of your units. Provide the answer in microseconds with one decimal place. Do not label your answer with the units, just provide the number .

Explanation:

The Answer to the question is given with proper step by step solution.

Given that : the round-trip-time (RTT in abbreviation) = 20ms = 0.02 micro seconds

L = 2000

Byte = 2000*8

bits = 16000 bits

R = 500Mbps = 500*106 bps

Now,calculate L/R = 16000 / 500*106

= 32 / 106

= 32 micro seconds

The Utilization (U) = fraction when the time sender is busy sending

= (L/R) / (L/R + RTT)

= (32) / (32 + 0.02)

= 32 / 32.02

= 0.99937539 seconds

= 999375.39 micro seconds

= 999375.4 (nearest tenth)

You might be interested in
Which 3 file formats can be used for importing lists directly into quickbooks online?.
Natali5045456 [20]

Answer:

Explanation:

QBO

IIF

QBJ

8 0
2 years ago
How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
Whitepunk [10]

Answer:

because they have to rest

3 0
3 years ago
Read 2 more answers
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
HELP URGENTLY!!!!!
Ganezh [65]
Which field TCP header is not typically used in modern networks
5 0
3 years ago
.Why are protocols important for networking?
NNADVOKAT [17]

Answer: Networking protocols are important as they define a set of rules to be used for exchanging information between computer nodes.

Explanation:

in terms of networking it is required for the source and the destination to have a set of predefined rules which enables the router to send and receive information across the network in such as way that both the ends are able to receive the messages.

The information exchange takes place first by the client by introducing itself to the remote server. the remote server upon receiving the information uses some form of handshaking and acknowledges the client of the receipt of the message.

besides this there are many routing protocols which tells us about the way how packets are sent from the client to the source. There are two types of routing protocols:

1. static routing protocols

2. dynamic routing protocols.

6 0
3 years ago
Other questions:
  • How does the zone theory of optical systems resolve the apparent incompatibility of trichromacy and opponency?
    5·1 answer
  • Graphic images can be stored in a variety of formats including ____.
    15·1 answer
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    7·2 answers
  • If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn’t introduced a n
    13·1 answer
  • Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
    5·1 answer
  • If your microwave oven is a computer, define its Operating System and User Interface.
    12·1 answer
  • In this class, it is very common for your computer screen to look like this. What is this?​
    5·1 answer
  • Diffreciate between primary source of information and secondary source of information​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!