packet switching, Computer Networking

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The transmission rates between the various network elements are as follows:
Between sending host and the 1st switch the rate is 2R1;
Between the 1st and the 2nd switch the rate is 3R2;
Between the 2nd and the 3rd switch the rate is R3.
Between the 3rd and the 4th switch the rate is 3R2;
Between the 4th and the 5th switch the rate is R1;
Between the 5th and the receiving host the rate is R1;
What is the total end-to-end delay to send a packet of length 2L? (Ignore queuing, propagation delay, and processing delay.)
Posted Date: 9/3/2013 11:02:25 AM | Location : Vietnam







Related Discussions:- packet switching, Assignment Help, Ask Question on packet switching, Get Answer, Expert's Help, packet switching Discussions

Write discussion on packet switching
Your posts are moderated
Related Questions
Explain the Physical layer The Physical layer of the OSI model sets standards for sending and receiving electrical signals among devices. It explains how digital data (bits) ar


Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma


An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams.

How receiver detects error The frame is 10011101. The generator is 1001. The message after appending the three zeros is 10011101000. The reminder on dividing 10011101000 by 100

Microcells As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of small buildings or the sides of large buildings, and finally to lamp

TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (

what's the difference among Symmetric and Asymmetric cryptosystem?

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversat