1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
14

How long does it take to send a 19 MiB file from Host A to Host B over a circuit-switched network, assuming:

Computers and Technology
1 answer:
muminat3 years ago
8 0

Answer:

58.4 ms

Explanation:

How long does it take to send a 14 MiB file from Host A to Host B over a circuit-switched network, assuming:

Total link transmission rate = 31.1 Gbps.

Network is TDM, with 11 permitted users, each with an equal time slot size.

A link connection requires a setup time of 51.7 ms.

Solution:

For TDM transmission, the bandwidth is divided equally between the users for transmission.

Transmission rate of each user = 31.1 Gbps / 11 users = 2.83 Gbps = 2830 Mbps

Time taken for file transmission = file size / transmission rate = 19 Mb / 2830 Mbps  = 0.0067 seconds = 6.7 ms

Total time taken = Set up time + transmission time  = 51.7 ms + 6.7 ms = 58.4 ms

The total transmission time is 58.4 ms

You might be interested in
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
What role do visual merchandisers play on the marketing team
almond37 [142]

They are responsible for the total merchandise or service presentation, the overall business/brand image, and even the building and placement of design elements.


8 0
3 years ago
A low credit score can lead to
CaHeK987 [17]
The answer would be B.
7 0
3 years ago
A developer wants to take existing code written by another person and add some features specific to their needs. Which of the fo
anzhelika [568]

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

7 0
3 years ago
Which of the following best define grit
andreyandreev [35.5K]

Definition of Grit. According to researchers at the University of Penn- sylvania, grit is defined as "perseverance and passion for long-term goals.” Grit involves working strenuously to- ward challenges, maintaining effort and interest over years despite failure, adversity, and plateaus in progress.

Hope This Helps!      Have A Nice Day!!

8 0
3 years ago
Other questions:
  • Cpu, ram, rom, and other electronic components are mounted on a board, which is called the
    15·1 answer
  • In 1–2 sentences describe the purpose of comparison operators and give an example.
    10·1 answer
  • Which of these converts analog audio signals into digital codes in a computer?
    5·2 answers
  • A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an a
    14·1 answer
  • ________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from th
    8·2 answers
  • Which of the following is NOT a project management cause of failed projects? (Points : 2) Shortcuts taken during the project
    8·1 answer
  • Would a hurricane form if the humidity is really high and the breeze is very low
    11·1 answer
  • Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display qualit
    11·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    12·2 answers
  • What would be the results if the Formula =2*C8+3*D9 is entered into a cell if the value displayed in C8 is 3,and the value in ce
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!