1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
5

Suppose there is exactly one packet switch between a sending user and a receiving user. The transmission rates between the sendi

ng user and the switch and between the switch and the receiving user are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the
Computers and Technology
1 answer:
beks73 [17]3 years ago
4 0

Answer: Hello your question lacks some data below is the missing data

<em> what is the total end-to-end delay to send a packet of length L? (Ignore queuing, propagation, and processing delay) extend to N-1 packet switches interconnected by N links with rates R1, R2, …, RN</em>

answer:

L/R1 + L/R2

Explanation:

The sending host will begin to transmit at to

At ( t1 = L/R1 ) the entire packet will be received at the router because at this time the sending host will complete the transmission process  to the router.( No propagation delay )

At ( t2 = L/R2 ) the router completes transmission of the entire packet to the receiving host ( note : The transmission of the packet to the receiving host by the router starts at t1 hence No propagation delay is recorded. )

You might be interested in
PLEASE I NEED HELP FAST
tankabanditka [31]

Answer:

your answer will be src=

7 0
3 years ago
What lets you do many things, like write book reports and stories?
Alex
Applicant programs? Is that an option. If not try operating systems
5 0
3 years ago
You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
Ray Of Light [21]

Answer:

This IP address is assigned to the interface by the following device:

d. The local computer

Explanation:

  • Ipconfig command is also known as Internet protocol configuration command. It is command line tool that is used to configure the IP of network connections. This command give us information about the information about IP and other parameters like default gateways.
  • The IP address 169.254.X.X is such IP address that can have values from 169.254.0.1 to 169.254.254.
  • 169.254.X.X is a Automatic Private IP Address that tells that our computer is not connected with the internet because the computer is not getting IP address from server.
5 0
4 years ago
What’s let’s you see your mouse on the screen in order to click icons, buttons , and menus
tatyana61 [14]

Answer: Easy one.

Explanation:

This would be the OS. The OS has a mouse cursor for you to use in Windows, and Linux, it's the same thing for some BIOS'es aswell, and this goes for setting up Windows, or Linux off of a flash drive or CD.

7 0
3 years ago
Sentinel-controlled iteration is also known as ________. Question 2 options: A) indefinite iteration B) double iteration C) defi
Sunny_sXe [5.5K]

Answer:

Option(A) i.e " indefinite iteration " is the correct answer to the given question.    

Explanation:

Sentinel-controlled iteration is also called indefinite iteration because the user or programmer do not known in the beginning of the iteration how many time the loop will iterated and instruction are executed sometimes it executed the loop in the infinite times .

  • For example : when fetching the data from the file the user or programmer Don't know when we would finish the file in advance.
  • All the others options are not belonging to the Sentinel-controlled iteration that's why they are incorrect.

4 0
3 years ago
Other questions:
  • 8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi
    7·1 answer
  • Which key removes all data from an active cell with one click? A. Esc B. Delete C. Tab D. F2
    9·2 answers
  • What is a Qwerty?<br> A) It's a Computer<br> B) It's a keyboard <br> C) A type of frog
    11·2 answers
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • Write a program to read a record from a binary file
    8·1 answer
  • Which statement best describes the purpose of SmartArt graphics in PowerPoint presentations?
    12·2 answers
  • Which statement about analog and digital images is true?.
    15·1 answer
  • How is blockchain different from traditional database models?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!