1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
11

Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second,

regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor
Computers and Technology
1 answer:
Marina86 [1]3 years ago
3 0

Answer:

When the transmission exceeds 667 packets

Explanation:

In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.

A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.

You might be interested in
Which part(s) of CAIN is realized through the use of message digest functions and hashes?
KonstantinChe [14]

Answer:

Integrity

Explanation:

In CAIN, integrity is realized through the use of message digest functions and hashes.

Integrity in CAIN simply means securing a message on transit without it being tampered. To accomplish and achieve integrity, hash functions are used. These hash functions receive arbitrary length message and bring out a fixed sized message digest.

The message digest and hash function maps input data of arbitrary length to an output fixed data length. Hashing is used to guarantee integrity.

5 0
4 years ago
SRV02 holds a shared folder named Forecast for the managers group. Maria is a member of the managers group. You would like to gr
belka [17]

Answer:

You need to enter to the server restrictions panel (it depends on which server you are using). Just like you granted full permission to the other members in the managers group, you need to add Maria to the group, but restricting her access to read-only, so she would only be able to view the files without modifying or erasing them.

Explanation:

8 0
4 years ago
This is currently the last 5 minutes I have left of Internet because I am outdoors but could anyone google for me the amount of
Jobisdone [24]
What are you asking?? I am confused.

7 0
4 years ago
You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
olga_2 [115]

Answer:

base station is the answer

7 0
3 years ago
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
Other questions:
  • What is mouse and how many types of mouse are there​
    11·1 answer
  • What web page has html file that exists on web server?
    10·1 answer
  • List & briefly explain 5 benefits of having a Business bank account.
    9·2 answers
  • I forgot to tell it’s on Roblox for those who play and wanted to be friends and new ppl username is mosarider489
    9·2 answers
  • Which of the following is not a characteristic of a motorcycle?
    6·1 answer
  • Where do you get your news? Is it owned by a large conglomerate does it matter to you who own your local news outlets? why or wh
    5·1 answer
  • A group of cells is called a<br><br> Excel
    5·1 answer
  • Not sure where I should ask this sorry
    15·1 answer
  • Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while
    6·1 answer
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!