1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
5

Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30

percent of the time.
a. (5 pts.) When circuit switching is used, how many users can be supported?



b. (5 pts.) For the remainder of this problem, suppose packet switching is used. What is the maximum number of users that can be supported if the required blocking probability is strictly less than 0.05 and what is the blocking probability with the determined maximum number of users?
Computers and Technology
1 answer:
V125BC [204]3 years ago
3 0

Answer:

The answer is "5 users and 1 block".

Explanation:

In Option a:

Bandwidth total = 1-Gbps \times 1000

                          = 1,000 \ Mbps      

Any User Requirement = 200 \ Mbps

The method for calculating the number of approved users also is:  

Now, calculate the price of each person for overall bandwidth and demands,  

\text{Sponsored user amount} = \frac{\text{Bandwidth total}}{\text{Each user's requirement}}

                                     =\frac{1000}{200}\\\\=\frac{10}{2}\\\\= 5 \ users

In Option b:

\text{blocking probability} = \frac{link}{\text{1-Gbps} = 10^9 \frac{bits}{sec}}

\ let = 0.05 = \frac{100}{20} \\\\\text{blocking probability} = \frac{ 200 \times 10^6}{\frac{100}{20}}

                                = \frac{ 200 \times 10^6 \times 20 }{100}\\\\= \frac{ 2 \times 10^6 \times 20 }{1}\\\\= 40 \times 10^6 \\\\

mean user = 25 \times \frac{1}{20} \\\\

                  = 1.25

max user = \frac{10^9}{40 \times 10^6} \\\\

                = \frac{10^9}{4 \times 10^7} \\\\ = \frac{10^2}{4} \\\\ = \frac{100}{4} \\\\= 25 \\\\ =\ \ 1 \ \ block \\\\

You might be interested in
How do computers use logic?
madreJ [45]
They don’t use any logic
8 0
4 years ago
If the transmitting device would like for the receiving device to push currently buffered data to the application on the receivi
Andreyy89

Answer:

The right approach will be "PSH".

Explanation:

  • The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete.
  • The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.
3 0
3 years ago
Explain briefly the FIREWALLS
Vlada [557]

Answer:

Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!

Explanation:

7 0
3 years ago
We piped the results of the Get-Process cmdlet to the Sort-Object cmdlet to sort them in descending order. Which property was us
Basile [38]
The answer is yes hope this helps did before
5 0
3 years ago
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
3 years ago
Read 2 more answers
Other questions:
  • Match each of the following terms to its function:_________
    13·1 answer
  • 6.12 Nested Increments Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' b
    12·1 answer
  • ​In sql server, the cursor property ____________________ means that the cursor is used for retrieval purposes only.
    9·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • I have answered 22 questions and my messages are still not working what is it that i'm doing wrong?
    6·1 answer
  • What symbol shows autocorrect is in use in access? WILL MARK BRAINLIEST FOR WHOEVER ANSWERS FIRST!!!
    5·1 answer
  • What is a cell? how is it referred?​
    8·1 answer
  • Write the text of the program in Python.
    12·1 answer
  • In Python, when do we use the str( ) function
    13·1 answer
  • What are types of operators in Python
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!