Relationship between throughput and delay, Computer Networking

If a data packet switch has a queue of data packets waiting when a new packet reach. The new packet will be located on the whole queue and will have to wait while the switch forward the previous packets.

Delay and throughput are not completely dependent. As traffic in a computer network raise, delays raise a network that performs at close to 100% of its throughput capacity experiences severe time delay.

DELAY THROUPUT PRODUCT:

It is calculated as delay time multiplied by effective throughput. It calculates amount of data that can be represent in the network. In fast network with long delay times, sender can generate big amounts of data before receiver receives first bit.

Posted Date: 7/31/2012 8:21:48 AM | Location : United States







Related Discussions:- Relationship between throughput and delay, Assignment Help, Ask Question on Relationship between throughput and delay, Get Answer, Expert's Help, Relationship between throughput and delay Discussions

Write discussion on Relationship between throughput and delay
Your posts are moderated
Related Questions
Define the tasks for which SNS is used SNA can be used for the following types of tasks: -  Terminal access to mainframe and midrange computer applications. -  File trans

Describe the static routing process A static routing method does not adapt to changing conditions on the network but uses a fixed method developed ahead of time. With alternat

Take the maximum packet lifetime, T.  It's stated that T must be big enough to make sure the packet and its ACK have vanished.  Why do we have to have the ACK?

1 Suppose you are the new regulator in charge who has authority over Internet services (although in reality such a position may not exist depending on your country). You aim to enh

While calculating shortest path, first we assume graph presentation of network at every node then we use Djikstra's algorithm to calculate shortest path from every node to other on

Ping and Traceroute are used by ICMP for Testing. Destination Unreachable messages are obtained by a router when it does not have a route to the network.

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

what is this ?

Data Distribution Data distribution directives tell the compiler how the program data is to be distributed between the memory areas associated with a set of processors. The log

This ICT-related issue that has been raised in the contemporary media, and the article is required to be included as part of the essay: Undertake further research about this top