Calculate the latency for the following

Assignment Help Basic Computer Science
Reference no: EM131046382

Calculate the latency (from first bit sent to last bit received) for the following:

(a) 10-Mbps Ethernet with a single store-and-forward switch in the path, and a packet size of 5000 bits. Assume that each link introduces a propagation delay of 10 μs and that the switch begins retransmitting immediately after it has finished receiving the packet.

(b) Same as (a) but with three switches.

(c) Same as (a) but assume the switch implements "cut-through" switching: It is able to begin retransmitting the packet after the first 200 bits have been received.

Reference no: EM131046382

Questions Cloud

Calculate the total time required to transmit 10,000 bits : Hosts A and B are each connected to a switch S via 10-Mbps links as in Figure 1.25. The propagation delay on each link is 20 μs. S is a store-and forward device; it begins retransmitting a received packet 35 μs after it has finished receiving it. ..
Diminishing musharakah sukuk with maturity : First, Please look at the excel sheets. You will see the diminishing Musharakah sukuk with maturity of 5 years (60 months). The investor's income come from two ways:
Six types of information you would gather : If a company hired you as a consultant to provide them a general assessment of their IT challenges across the enterprise, what would be six types of information you would gather.
Definition of a class counter containing : Write the definition of a class Counter containing: An instance variable named counter of type int. A constructor that takes one int argument and assigns its value to counter A method named increment that adds one to counter.
Calculate the latency for the following : Same as (a) but assume the switch implements "cut-through" switching: It is able to begin retransmitting the packet after the first 200 bits have been received.
What did you learn about the choreographer : Was the work in one dance style or tradition? (modern, African, tap, flamenco, jazz, ballet, folklore, Native American, etc.). If not, how did it combine movements and qualities found in several kinds of dance?
Computer science os : Some operating systems use base and bound registers to protect memory. The bounds registers updated (or changed)
Calculate the bandwidth necessary for transmitting : HDCD high-definition audio of 24-bit samples at 88.2 KHz. 30 Discuss the relative performance needs of the following applications, in terms of average bandwidth, peak bandwidth, latency, jitter, and loss tolerance:
Binary equivalent of the ethernet address : What is the hexadecimal (hex) to binary equivalent of the following Ethernet address? What is the equivalent of hex to decimal? Use the http://www.binaryhexconverter.com/ converter for the calculations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Program to solve the selection problem

1. Write a program to solve the selection problem. Let k = N/2. Draw a table showing the running time of your program for various values of N.

  Driver class called fliprace whose main method created

PP 5.6: Using the Coin class defined in this chapter, design and implement a driver class called FlipRace whose main method created two Coin objects, then continually flips them both to see which coin first comes up heads three flips in a row. Contin..

  Write an instruction sequence to swap the upper four bits

Write an instruction sequence to swap the upper four bits and the lower four bits of accumulator A(swap bit 7 with bit 3, bit 6 with bit 2, and so on).

  What are the strengths and weeknesses

What are the strengths? What are the weaknesses? What recommendations would you make for improving host security? Write a one-page paper on your analysis.

  Study evidence for defence in law firm

You are engaged by law firm to study evidence for the defence. You uncover evidence that doesn't help your client's case but was not discovered by the prosecution.

  Explain throughput and capacity for effectiveness of system

Do you agree or disagree that throughput and capacity are finding factors for effectiveness of system more so than processor speed?

  Express the available bandwidth as a function of n

Assuming the average packet size is 5 slot times, express the available bandwidth as a function of N.

  Given two stringsa and bcreate a bigger string made char a

Given two strings, A and B, create a bigger string made of the first char of A, the first char of B, the second char of A, the second char of B, and so on. Any leftover chars go at the end of the result

  You will be designing an on campus internetwork for new larg

You will be designing an on-campus internetwork for new large university that has been proposed. The University will have dozens of buildings, all within a very close proximity to each other. Use the University of California, Berkeley Campus as a mod..

  How would you determine the numbers given above

How would you determine the numbers given above, and which values might be less certain?

  Provide centralized authentication and logging

Scenario You have two VPN servers. One is located in the main corporate office and the second is located at the backup site. You want to provide centralized authentication and logging. What will you do and why?

  What are the functions of the cps

what are the functions of the CPS? (control prossesing system)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd