Compute the bandwidth requirements for a live event

Assignment Help Operating System
Reference no: EM1379555

Compute the bandwidth requirements for a live event that is streamed over the Internet based on the information below.

Assume you are the network administrator for an Internet Service Provider (ISP). Your company has been asked to provide bandwidth for a live event produced by one of your clients.

You have been asked to calculate the total data transfer required for the event. You have also been asked to verify that your Internet connection can support the maximum estimated concurrent listeners. You have a 45-megabits-per-second (Mbps) connection to the Internet (a T3 circuit).

Event details are as follows.

* Time of the event: 6:00 P.M.-8:00 P.M.
* Encoding rate: 22 kilobits per second (Kbps)
* Average length of play: 60 minutes
* Total listeners: 1,500
* Concurrent listeners: 1,200

1. Compute the total data transfer for the live event.
2. Compute the required internet connection bandwidth.

 

Reference no: EM1379555

Questions Cloud

Creating hipo charts and decision tables : Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,
Question about vpn communications : Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network.
Catching exception : Create a program that shows how various exceptions are caught with catch Exception
Effects of spyware and adware : Describe the effects of spyware and adware. Discuss how has spyware and adware impacted the public's confidence in the security of internet?
Compute the bandwidth requirements for a live event : Compute the bandwidth requirements for a live event that is streamed over the Internet based on the information given below.
Pros and cons of using embedded uid and pw : Think about an embedded user id and password which provides me access to a client/server environment. Discuss the pros and cons of using an embedded uid and pw?
Drawbacks and benefits of outsourcing : Discuss the drawbacks and benefits of outsourcing, which has become one of the hot issues today from the viewpoint of Quality Assurance.
Automate or automated patch deployment : Discuss and define Automate or Automated patch deployment?
Securing standard telecommunications line vs voip connection : Determine the difficulty(s) of securing a standard telecommunications line vs. securing a VOIP connection?

Reviews

Write a Review

Operating System Questions & Answers

  Question about internet use policies

Internet use policies are often utilized in corporations. Conduct independent research on these and construct an Internet use policy for your company or an organization of your choice.

  Validating the option code field during data entry

The systems reviewer are constructing the test plans for the user interface for the Holloway Travel Vehicles system.

  Design virtual memory system for new operating system

You are asked to design the virtual memory system for a new operating system working on small mobile devices. The memory operates at 333 MHz with a word size of 4 bytes.

  Challenges os faces-passing parameter among user-kernel mode

Write two challenges an OS faces when passing parameters between user and kernel mode. Describe how an OS can overcome them

  Operating system interfaces questions

Select one of the programs that comes with Vista in which you think your classmates would be interested. Determine what does the program do?

  Define the term context switch

Define the term context switch. Explain how context switching takes place. (use a diagram, with two processes)

  What are some ways to integrate linux servers

What are some ways you could integrate Linux servers into a Windows network to share information? What would be the advantages and disadvantages?

  Vliw processor

VLIW processor - assembler

  Pros and cons of using embedded uid and pw

Think about an embedded user id and password which provides me access to a client/server environment. Discuss the pros and cons of using an embedded uid and pw?

  Operating system maps user-level threads to kernel

Suppose an operating system maps user-level threads to the kernel using the many-to-many model and the mapping is done through LWPs.

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

  P2p file distribution protocol

In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd