Question about processing packets

Assignment Help Operating System
Reference no: EM1379683

Question: A CPU in a router can procedure two million packets/sec. The load offered to it is 1.5 million packets per sec. If the route from source to destination contains ten routers (having no additional traffic), how much time is spent being queued and serviced by the CPUs. Suppose Poisson arrivals and departures at each router.

Reference no: EM1379683

Questions Cloud

Determine the largest value : A soft real time system has 4-periodic events with periods of 50, 100, 200 and 250 msec each. Assume 4-events need 35, 20, 10 and X msec of CPU time, respectively.
Determine the utilization of the cpu : Two real time procedures are running on a computer. The 1st one runs every 25 msec for ten msec. The second one runs every 40 msec for fifteen msec.
Prepare analyses to help in making their decisions : Using the data provided by the controller, prepare analyses to help Robert and Jane in making their decisions. (Hint: Prepare cost calculations for both product lines using ABC to see whether there is any significant difference in their unit costs). ..
Question about atm networks : ATM networks use a token bucket program to regulate traffic. A new token is put into the bucket every one usec so ATM cells can be sent during this period.
Question about processing packets : A CPU in a router can procedure two million packets/sec. The load offered to it is 1.5 million packets per sec. If the route from source to destination contains ten routers
Network crashes are hypothesized : Assume we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message.
Describe an algorithm to play the game of nim : Describe an algorithm to play the Game of Nim using all of the three tools discussed in class (pseudocode, flowchart, hierarchy chart).
Differences between the internet, intranets, extranets : Discuss similarities and differences between the Internet, intranets, extranets. Define e-Commerce and discussow can e-Commerce businesses be categorized?
Dealing with internet security and privacy : A procedure is said to be I/O bound if it needs a lot of I/O operations, whereas a procedure that consists of mostly computations within the CPU/memory system is said to be compute bound.

Reviews

Write a Review

 

Operating System Questions & Answers

  Find the total number of bytes in the frame

Determine how long does it take to transmit a 10baseT Ethernet frame that contains 256 bytes of data and ignore all the interframe gap that follows the frame.

  Advantages of home networking

Discuss the advantages of home networking? Do you find that most of the documents are actually stored on a single computer.

  Procedure to manually remove the existing power supply

Explain the procedure necessary to properly install or replace the computer power supply in a computer.

  Supporting a transmission system

A transmission system operates at sixteen MHz. The power output is 1 W and .1 Watt is needed at the receiver. The receiver is located one hundred meters from the transmitter.

  Dns security measurements

Having a Domain Name Server available to the public can be a tool in the hand for attackers. If anyone is able to use your Domain Name Server, they can use it to send a huge amount of traffic to their victim.

  Discussion networking concepts using the osi model

Suppose your manager has asked you to explain the frame format of a typical Ethernet packet. Set-up a written report. Be sure to discuss Manchester encoding and 8B/10B encoding.

  Direct mapped cache- word, block, tag

Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.

  Explain how a race condition is possible

the wife calls deposit (). Describe how a race condition is possible and what might be done to prevent the race condition from occurring.

  Determine major computer components

Suppose you have decided to buy a personal computer system for personal use and wish to be able to do the following tasks on the computer,

  Combining voice, video and data communications

Discuss the advantages and disadvantages to combining voice, video, and data communications into one interface such as Skype.

  Drawbacks and benefits of outsourcing

Discuss the drawbacks and benefits of outsourcing, which has become one of the hot issues today from the viewpoint of Quality Assurance.

  Security and data protection systems

Determine what fault tolerance, security, and information protection systems and procedures do you recommend be instituted on and for the corporation's network from the hypothetical condition below?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd