Circuit switched and packet-switched mode for sending a file, Computer Networking

Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to transmit to host B. The propagation delay is 3ms for each link. Neglect processing and queuing delays.

a)  How long will it take to send the file from Host A to Host B in circuit-switched mode if the circuit setup and tear-down take 50ms each?

b)  How long will it take to send the file in packet-switched mode if the file is divided into 1000 equal chunks, and each chunk will have 100 byte header added to form a packet?

Posted Date: 3/25/2013 6:06:46 AM | Location : United States







Related Discussions:- Circuit switched and packet-switched mode for sending a file, Assignment Help, Ask Question on Circuit switched and packet-switched mode for sending a file, Get Answer, Expert's Help, Circuit switched and packet-switched mode for sending a file Discussions

Write discussion on Circuit switched and packet-switched mode for sending a file
Your posts are moderated
Related Questions
modern technology in world of 21 century

Question : (a) Describe how ‘prototyping' is important to RAD. (b) List main features of ‘prototyping'. (c) List main principles of DSDM. (d) Describe the DSDM life-



Quetion: An amplifier increases the peak-to-peak voltage of a signal from 1 V to 20 V. What is the amplifier's gain in dB?


Q. Show the IP Address Representation? IP Addressing IP Address Representation Binary notation - IP address is displayed as 32 bits Dotted-decimal notation -

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit