Network message transfer, Computer Engineering

Consider a network message transfer among a source S and a destination D by 3 routers R1, R2 and R3 as given below:-

 

            S -------- R1 --------- R2 --------- R3 --------- D

 

 A message M requires to be transferred from S to D.  M will be divided into packets; thus M/Packet Size is the number of packets. For example, if M is 100 MB, and packet size is 10MB then there will be10 Packets. Write a simple program to simulate the arrival of a packet at R1, then R2, then R3, and then D, and at last the program should indicate how long it would take for the entire message M to arrive at D.In the program the user should be able to choose different packet sizes, bandwidths of the links, link speeds and lengths of the links. Ignore the queuing and processing delays.

 

Posted Date: 3/25/2013 1:30:18 AM | Location : United States







Related Discussions:- Network message transfer, Assignment Help, Ask Question on Network message transfer, Get Answer, Expert's Help, Network message transfer Discussions

Write discussion on Network message transfer
Your posts are moderated
Related Questions
Q. Definition of Lists? Another type of list is a definition list. Definition lists have a heading and text appears below that. EXPERTSMI

What are links and associations? Link is a physical or conceptual connection between objects. A link is an instance of an association.  Association is a explanation of group

Q. How to Correct the error condition while copying file in DOS? In most case, DOS allows you to correct the error condition and retry the command (by pressing R). If the drive

What is meant by hotspots? A Hotspot is a list area where the mouse pointer appears as an upright hand symbol. When a user points to that area (and the hand cursor is active),

Problem (a) Explain the difference between the real mode and the protected mode in the 80x86 family of processors. (b) The 32-bit physical address 047C:0048 is to be conv

Visibility. Controls should be clearly visible, so users can see the controls that are available to them. Visual feedback should also be clearly visible, so users can understand wh

My name is mrs flo and i apporve dubstep, do you apporve it?

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

Minimise the logic function F (A, B, C, D) = Π M (1, 2, 3, 8, 9, 10, 11,14) ⋅ d (7, 15) Use Karnaugh map.   Ans. Given function F=∏M(1,2,3,8,9,10,11,14).d(7, 15) F'=B'D+B'C+AC+AB'

A 4-bit synchronous counter uses flip-flops with propagation delay times of 15 ns each.  The maximum possible time required for change of state will be ? Ans. 15 ns since in sy