Relationship between throughput and delay, Computer Networking

If a data packet switch has a queue of data packets waiting when a new packet reach. The new packet will be located on the whole queue and will have to wait while the switch forward the previous packets.

Delay and throughput are not completely dependent. As traffic in a computer network raise, delays raise a network that performs at close to 100% of its throughput capacity experiences severe time delay.

DELAY THROUPUT PRODUCT:

It is calculated as delay time multiplied by effective throughput. It calculates amount of data that can be represent in the network. In fast network with long delay times, sender can generate big amounts of data before receiver receives first bit.

Posted Date: 7/31/2012 8:21:48 AM | Location : United States







Related Discussions:- Relationship between throughput and delay, Assignment Help, Ask Question on Relationship between throughput and delay, Get Answer, Expert's Help, Relationship between throughput and delay Discussions

Write discussion on Relationship between throughput and delay
Your posts are moderated
Related Questions
What are the data units at different layers of the TCP / IP protocol suite? The data unit formed at the application layer is known as a message, at the transport layer the data

There are various computational models for representing the parallel computers. In this part, we discuss various models. These models would give a platform for the designing as wel

Ethernet Frame Fields Preamble - seven bytes of alternating 0s also 1s to notify receiver of incoming frame and to provide synchronization SFD (Start frame delimiter)

Discuss about the similarity of Intranets to the Internet The ease of use of the end user would be the most noticeable because of the similarity of Intranets to the Internet. S

I have a project on Information Communication Technology(I.C.T). So sir I want to know that what is internet? and how it works?

Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv



Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are g

a) Consider that a host is sending a frame of 1200 bytes to another host found 20 Kilometers away. (Assume that switching delay is negligible) i) Calculate the total latency (