1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
15

Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch

Sis a store-and-forward device and it requires a delay of 35μs to process a packet after is has received the last bit in the packet. Calculate the total time required to transmit 40,000 bits from Ato B in the following scenarios. (The total time is measured from the start of the transmission of the first bit at A, until the last bit is received at B. We always assume that links are bi-directional with the same transmission rate and propagation delay in each direction unless specifically instructed otherwise.)
Computers and Technology
1 answer:
Oksanka [162]3 years ago
4 0

Answer:

885 μs

Explanation:

Given that:

Switch via = 100 Mbps links

The propagation delay for each link = 25μs.

Retransmitting a received packet = 35μs

To determine:

The total time required to transmit 40,000 bits from A to B.

Considering the fact as a single packet:

Transmit Delay / link = size/bandwith

= 4×10⁴ bits / 100 × 10⁶ bits/sec

= 400 μs

The total transmission time = ( 2 × 400 + 2 × 25 + 35) μs

= (800 + 50 + 35) μs

= 885 μs

You might be interested in
Which of the following groups is NOT located on the Home tab?
padilas [110]

Which of the following groups is NOT located on the Home tab?

Animations

3 0
3 years ago
Read 2 more answers
Which statement regarding socializers is true?
allochka39001 [22]

Answer:

The answer is: they are comparable to suit of hearts

Explanation:

The answer is: they are comparable to suit of hearts

7 0
3 years ago
Read 2 more answers
What do we call exceptions to the exclusive rights of copyright law?
Studentka2010 [4]

Answer:

Fair use

Explanation:

I don't know if this is correct but Its the best option.

4 0
3 years ago
Suppose your name was George Gershwin. Write a complete program that would print your last name, followed by a comma, followed b
NNADVOKAT [17]

Answer:

I will write the code in C++ and JAVA      

Explanation:

<h2>JAVA CODE</h2>

public class Main

{ public static void main(String[] args) {

       // displays Gershwin,George

     System.out.println("Gershwin,George"); }  }

<h2>C++ Code:</h2>

#include <iostream>

using namespace std;  

int main()

{  cout<<"Gershwin,George"; }    

// displays last name Gershwin followed by , followed by first name George

//displays Gershwin,George as output.

6 0
4 years ago
Read 2 more answers
A ________ provides quick access to context indicators, email, secure instant messaging, voice and video calling, conference cal
e-lub [12.9K]

Answer:

Universal dashboard

Explanation:

Universal dashboards is a web framework that help people manage their unified communications, providing quick access to context indicators, email, secure instant messaging, voice and video calling, conference calling, corporate RSS feeds, and more. The Mitel Unified Communicator Advanced is a software client that integrates all these features thereby making it possible for employees and co-workers to communicate. This software can also be used to integrate both a company’s ERP and customer relationship management system launching the customer information on the screen any to time a call is been made  such as customer name and location.

5 0
3 years ago
Other questions:
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • Your database was damaged due to hardware failure. What can you use to restore it?
    5·1 answer
  • Having network users login with a username and password is an example of:
    12·1 answer
  • Se citește un număr natural n cu cel mult 16 cifre. Fie q numărul de cifre ale numărului n. Prin eliminarea unei singure cifre d
    5·1 answer
  • The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configura
    8·1 answer
  • As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return
    9·1 answer
  • Ergonomics implications of computer​
    12·1 answer
  • Which tool is used to see the wireless networks in a given area?
    5·1 answer
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!