1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
15

How long does it take to send a 15 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmis

sion rate
Computers and Technology
1 answer:
alexdok [17]3 years ago
7 0

Answer:

The answer is "102.2 milliseconds".

Explanation:

Given:

Size of file = 15 MiB

The transmission rate of the total link= 49.7 Gbps

User = 7

Time of setup = 84.5 ms

calculation:

1\ MiB = 2^{20} = 1048576\ bytes\\\\1\ MiB = 2^{20 \times 8}= 8388608\  bits\\\\15\ MiB= 8388608 \times 15 = 125829120\ bits\\\\

So,

Total Number of bits = 125829120 \ bits

Now

The transmission rate of the total link= 49.7 Gbps

1\ Gbps = 1000000000\ bps\\\\49.7 \ Gbps = 49.7 \times 1000000000 =49700000000\ bps\\\\FDM \ \ network

\text{Calculating the transmission rate for 1 time slot:}

=\frac{ 49700000000}{7} \ bits / second\\\\= 7100000000 \ bits / second\\\\ = \frac{49700000000}{(10^{3\times 7})} \ in\  milliseconds\\\\ =7100000 \ bits / millisecond

Now,

\text{Total time taken to transmit 15 MiB of file} = \frac{\text{Total number of bits}}{\text{Transmission rate}}

= \frac{125829120}{7100000}\\\\= 17.72\\\\

\text{Total time = Setup time + Transmission Time}\\\\  

                 = 84.5+ 17.72\\\\= 102.2 \ milliseconds

You might be interested in
One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
Artyom0805 [142]
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

4 0
4 years ago
Read 2 more answers
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
mote1985 [20]

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

3 0
3 years ago
Complete the sentence.<br> Python is a_____<br> level language compared to bytecode.
Crazy boy [7]

Answer:

High

Explanation:

Python is high level; Bytecode is intermediate

5 0
3 years ago
Read 2 more answers
The winning design is typically that which most closely meets the design
zimovet [89]

when the when the when the add the when are you is id god his gay for your top off jack dafe cafe read line green red whats the answerAnswer:

when the when the when the add the when are you is id god his gay for your top off jack dafe cafe read line green red whats the answer

Explanation:

7 0
3 years ago
____________ is the ability to stand up for your own interests and to ask for what you want. A. Discipline B. Arrogance C. Asser
devlian [24]
C. Assertiveness. Assertiveness is defined as confident and forceful behavior, so it is the only one that makes sense.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What aspect do you need to keep in mind when you add images in a word document?
    11·2 answers
  • Can someone help me
    8·1 answer
  • How can I get answers on Collage Board for AP classes when using the inspect element? (AP WORLD HISTORY)
    13·1 answer
  • Will my ethernet adapter stop eveyone from getting WiFi if connected to my laptop ?
    5·1 answer
  • When do you use an else statement for coding
    6·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • Rewrite the following program segment using a while loop instead of a for loop.
    11·1 answer
  • If consumers start to believe they need a product, what is likely to happen
    15·1 answer
  • Define management styles
    14·2 answers
  • Fill in the blanks to help write this professional e-mail:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!