Give the order in which the packets are transmitted

Assignment Help Basic Computer Science
Reference no: EM131045730

Suppose a router has three input flows and one output. It receives the packets listed in Table 6.3 all at about the same time, in the order listed, during a period in which the output port is busy but all queues are otherwise empty. Give the order in which the packets are transmitted, assuming

(a) fair queuing

(b) weighted fair queuing with flow 2 having twice as much share as flow 1, and flow 3 having 1.5 times as much share as flow

1. Note that ties are to be resolved in order flow 1, flow 2, flow 3.

979_651bb5c5-4fa2-4b71-8f7c-3880f23c6e80.png

Reference no: EM131045730

Questions Cloud

L&m engaged gentner and company : L&M Home Health Corporation (L&M) had a checking account with Wells Fargo Bank. L&M engaged Gentner and Company, Inc. (Gentner) to provide consulting services, and paid Gentner for services rendered with a check drawn on its Wells Fargo account in..
Demonstrate the application of the exponential cpg : Simulate this ­process using the exponential CPG. Using Excel, develop a histogram with 50 data points and ­verify that your CPG is indeed replicating the exponential behavior
The value fi was interpreted as a timestamp : the time when the ith packet would finish transmitting. Give an interpretation of Fi for weighted fair queuing, and also give a formula for it in terms of Fi-1, arrival time Ai , packet size Pi , and weight w assigned to the flow.
Prepare a complete year 2015 federal corporate tax return : Prepare a complete year 2015 federal corporate tax return for Acme Corporation - You formed Acme by contributing $20,000 to the corporation in return for 1 share of stock
Give the order in which the packets are transmitted : weighted fair queuing with flow 2 having twice as much share as flow 1, and flow 3 having 1.5 times as much share as flow
Describe a scenario in which the r1-r2 link is not 100% : A always has data ready to send. Hint: Suppose A's Congestion Window increases from N to N + 1, where N is R1's queue size.
Explain who should bear the risk of loss : Stephens delivered 184 bushels of corn to Aubrey, for which he was to receive $478.23. Aubrey issued a check with $478.23 typewritten in numbers, and on the line customarily used to express the amount in words appeared ‘‘$100478 and 23 cts'' impri..
Ignore a fast recovery when packet is lost : Give a table showing, for the first 15 seconds, what A receives, what A sends, what R sends, R's queue, and what R drops.
Hygiene factors than motivating factors : While she has a good relationship with her coworkers and her supervisors are? understanding, she feels that her hard work often goes unnoticed. Being an ambitious person? Herself, this lack of acknowledgment is unsettling. Which of the following i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify an incident in cybercrime or cyberwarfare

Identify an incident in cybercrime or cyberwarfare related to this entity. Fully discuss the specifics of the cyber incident (and related incidents) and analyze the motivation of the actors/attackers. Also suggest methods for organizations to d..

  Safe and secure packet transmission

Write about the advantages and disadvantages when the streaming stored audio runs over UDP protocol in 1 to 2 page along with references.Explain the given statement "TCP is generally used for safe and secure packet transmission."

  Plan the logic for a program for the sales manger

plan the logic for a program for the sales manger of the couch potato furniture company. The manger needs a program to determine the profit on any item sold. Input includes the wholesale price and retail price for an item.

  Prepare a game called mysterywordgame

Continue prompting the user to enter letters until they have filled in the word or run out of turns. If they run out of turns (10 max) display the word.

  Monitoring systems section of lecture

In the Monitoring Systems section of this lecture (attached), we mentioned that: It should be noted that these example protocols are not really related to computer systems.

  Goals and objectives to perform an information systems audit

You have to provide a detail description in order for full credits.

  Write a paper that defining computer science

Write a paper that defining Computer Science and the kinds of jobs that computer scientists do.

  Implementation of self-adjusting lists

Write a linked list implementation of self-adjusting lists. Suppose each element has a ?xed probability, pi, of being accessed. Show that the elements with highest access probability are expected to be close to the front.

  Recognize all of the stakeholders comprised in the project

prepare a list of it project-based tasks in an organization where you have worked. if you have not worked in any

  Is there a relationship between ebcdic character

Is there a relationship between EBCDIC character representation of the decimal digits from 0 to 9 and their BCD representation? Explain.--Consider a hypothetical computer system. A two-byte memory space is used for a sign-and-magnitude representation..

  Construct user accounts with necessary privileges.

• Construct user accounts with necessary privileges.• Assign user roles to the accounts created• Apply access mechanisms to allow or disallow access, based on data classification

  Rss feed for research

Plagiarizing is serious. Not giving credit in our work where we find our information is considered stealing. Read about a journalist that lost his job for plagiarizing from a blog. Websites are especially difficult to cite correctly.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd