1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
8

If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the cha

nnel (the utilization), given that the round-trip-time (RTT) for a router is 20ms when sending 2000 Byte packets ( a byte is 8 bits) at 500Mega bits per second (Mbps)
Computers and Technology
1 answer:
olganol [36]3 years ago
5 0

Answer:

This question is incomplete, here is the complete question;

If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the channel (the utilization), given that the round-trip-time (RTT) for a router is 20ms when sending 2000 Byte packets ( a byte is 8 bits) at 500Mega bits per second (Mbps)? Answer to the nearest tenth of a microsecond. Recall that the formula for utilization U is L/R / (L/R + RTT). Be careful of your units. Provide the answer in microseconds with one decimal place. Do not label your answer with the units, just provide the number .

Explanation:

The Answer to the question is given with proper step by step solution.

Given that : the round-trip-time (RTT in abbreviation) = 20ms = 0.02 micro seconds

L = 2000

Byte = 2000*8

bits = 16000 bits

R = 500Mbps = 500*106 bps

Now,calculate L/R = 16000 / 500*106

= 32 / 106

= 32 micro seconds

The Utilization (U) = fraction when the time sender is busy sending

= (L/R) / (L/R + RTT)

= (32) / (32 + 0.02)

= 32 / 32.02

= 0.99937539 seconds

= 999375.39 micro seconds

= 999375.4 (nearest tenth)

You might be interested in
Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use
tester [92]

Answer:

You need 3 different IP subnets. -- d. 3

Explanation:

The devices in one VLAN are typically in the same IP subnet so you need one subnet for each VLAN.

8 0
3 years ago
As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
algol13
Your answer to the question would be "Root"
4 0
4 years ago
Help! I turned on my computer and this screen came on out of nowhere, I don't know what to do to fix it.
babunello [35]

Here are the steps I would do:

Do a "hard" power off. Hold the power key until the screen turns off. Wait 10 seconds. Turn it on. If it still shows the screen... then i'm not sure.

The error is occurring because it has nothing to boot off of. It's probably something wrong with your hardware. The instructions say for you to insert a "boot disk" and press any key.

4 0
3 years ago
Read 2 more answers
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
Studentka2010 [4]

Answer:

to find a answer in brainly

7 0
2 years ago
Read 2 more answers
We learned that an ideal multiple access protocol has FOUR desirable
Nataly [62]

Answer:

We learned that an ideal multiple access protocol has FOUR desirable

characteristics, describe them.

Explanation:

1.- Very experienced technology and easy to implement.

2.- Rigid resource management and unfit for variable traffic flows.

3.- Requires antenna duplexer for duplex transmission.

<u>Duplex</u> <em>is a term used in telecommunication to define a system that is capable of maintaining two-way communication, sending and receiving messages simultaneously. </em>

4.- Normally FDMA is combined with multiplexing FDD.

<u>FDMA</u> (acronym in English for Frequency Division Multiple Access) <em>is a multiplexing technique used in multiple communication protocols, both digital and analog, mainly radio frequency, and among them in mobile phones of GSM networks. </em>

<u>FDD</u> (Frequency Division Duplexing in English) <em>designates a duplex method in the environment of wireless telecommunications and over certain wired networks.</em>

4 0
4 years ago
Other questions:
  • Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).
    5·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the
    15·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • Everytime my daughter tries to ask for an app, or a money thing inside an app.. The request won't go through. Anybody know how t
    12·1 answer
  • Why do I get everything in English?​
    5·2 answers
  • Consider the following method, which is intended to return the number of local maximum values in an array Local maximum values a
    6·1 answer
  • How many devices can I sign in on with my one Brainly account?
    5·2 answers
  • Someone please help me
    6·1 answer
  • Question 1 of 10
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!