1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
5

Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30

percent of the time.
a. (5 pts.) When circuit switching is used, how many users can be supported?



b. (5 pts.) For the remainder of this problem, suppose packet switching is used. What is the maximum number of users that can be supported if the required blocking probability is strictly less than 0.05 and what is the blocking probability with the determined maximum number of users?
Computers and Technology
1 answer:
V125BC [204]3 years ago
3 0

Answer:

The answer is "5 users and 1 block".

Explanation:

In Option a:

Bandwidth total = 1-Gbps \times 1000

                          = 1,000 \ Mbps      

Any User Requirement = 200 \ Mbps

The method for calculating the number of approved users also is:  

Now, calculate the price of each person for overall bandwidth and demands,  

\text{Sponsored user amount} = \frac{\text{Bandwidth total}}{\text{Each user's requirement}}

                                     =\frac{1000}{200}\\\\=\frac{10}{2}\\\\= 5 \ users

In Option b:

\text{blocking probability} = \frac{link}{\text{1-Gbps} = 10^9 \frac{bits}{sec}}

\ let = 0.05 = \frac{100}{20} \\\\\text{blocking probability} = \frac{ 200 \times 10^6}{\frac{100}{20}}

                                = \frac{ 200 \times 10^6 \times 20 }{100}\\\\= \frac{ 2 \times 10^6 \times 20 }{1}\\\\= 40 \times 10^6 \\\\

mean user = 25 \times \frac{1}{20} \\\\

                  = 1.25

max user = \frac{10^9}{40 \times 10^6} \\\\

                = \frac{10^9}{4 \times 10^7} \\\\ = \frac{10^2}{4} \\\\ = \frac{100}{4} \\\\= 25 \\\\ =\ \ 1 \ \ block \\\\

You might be interested in
You conduct an experiment to find the probability of a flipped coin landing on
AleksAgata [21]

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

5 0
2 years ago
Read 2 more answers
Routers do not forward broadcast packets.A. TrueB. False
mestny [16]
The answer you’re looking for is false
5 0
2 years ago
What year did polaroid introduce one-step photography with the SX-70
blagie [28]

Answer:

I first saw the Polaroid SX-70—the one-step instant camera introduced in 1972 by the company's co-founder, Dr.

Explanation:

5 0
2 years ago
Will mark Brainliest, need help ASAP!
Whitepunk [10]

Answer:

What Sherman needs to configure is:

RIPv2 class D of 240.

Explanation:

Multicast messages are usually dispatched to a select group of hosts on a network and require acknowledgement of the recipients. RIPv2 is a router-based internet protocol for exchanging routing information to the IP address 224.0. 0.9 on a network. It determine the most efficient way to route data on a network and to prevent routing loops.

3 0
2 years ago
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
Irina-Kira [14]

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

3 0
3 years ago
Other questions:
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
    8·1 answer
  • A ________ is a user-interface component with two states: checked and unchecked. radio button check box menu item submenu item
    5·1 answer
  • Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
    6·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?
    12·1 answer
  • Explain set associative mapping<br>​
    10·1 answer
  • 1)What is the hydropower resources/energy?
    7·1 answer
  • Implement the ArrayMethod application containing an array that stores eight integers. The application should call the following
    12·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!