The propagation speed on the bus is 25x108 ms calculate the

Assignment Help Computer Engineering
Reference no: EM13469888

Assume you want to transfer a file containing 500,000 bytes from one computer to another on a bus topology local network. Assume the two computers are a distance D apart, that the bus data rate is B bps, and each frame is P bits long, where 80 of these bits are occupied by the header and trailer information. Each frame of the file must be acknowledged with a 96-bit frame (2 data bytes) before the next is sent. The propagation speed on the bus is 2.5x108 m/s. Compute the total time necessary to transfer the file for the following values:

a) D = 100m, B = 1Mbps, P = 256 bits

b) D = 1km, B = 10Mbps, P = 512 bits

c) D = 100m, B = 40Mbps, P = 1024 bits

d) D = 1km, B = 100Mbps, P = 10,000 bits

Reference no: EM13469888

Questions Cloud

Interview 3 criminal justice professionals from different : interview 3 criminal justice professionals from different areas of the criminal justice field in your local
In a 5 bit crc error detecting scheme suppose that we : in a 5 bit crc error detecting scheme assume we choose the generating bit sequence as 11011.a encode the bit stream
As the prevalence of social media continues to rise : as the prevalence of social media continues to rise consumers are recognizing ways in which social media can direct
Educate mary about date rape using statistics and : you have decided to speak with the prosecutor mary on behalf of maureen the college student who was the victim of date
The propagation speed on the bus is 25x108 ms calculate the : assume you want to transfer a file containing 500000 bytes from one computer to another on a bus topology local
Describe what is occuring at nanoscale during energy : sodium hydroxide reacts with sulfuric acid to produce sodium sulfate and water. how many grams of sodium hydroxide are
The assaults among inmates have risen 30 over the past : you are the new warden assigned to a closed-security prison. this prison has been overwhelmed with security lapses
A student measures conductivity of a kno3 solution and : a student measures the conductivity of a kno3 solution and determines it to be a strong electrolyte. the student
What methods of adr would be available to pursue which of : write a memo on a state not federal level business dispute. describe as if you were writing a white paper for your

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionproduce a function mult-stream that takes as input

questionproduce a function mult-stream that takes as input two arguments-the first argument is a multiplier m which is

  Design a flowchart and pseudocode using control breaks

design a flowchart and pseudocode using control breaks that enable the user to print invoices for any raw material that is selected.

  Pros and cons of different security techniques

Why is it important for an organization to follow the standard systems acquisition method?pros and cons of different security techniques.

  Questioninternet protocol standards are devised throughout

questioninternet protocol standards are devised throughout the efforts of thousands of people all over the world --

  How to generate 2 instances of time and date

generate an application that uses both Time and Date classes How to generate 2 instances of Time and Date

  Federal rules and criminal codes

Think about computer forensics professional’s testimony preparations, and how the investigator must ensure that the federal rules and criminal codes are followed both during and after the completion of the investigation. Identify and discuss some ..

  Find how many values were specified on the command line

Write down a program in PERL that have two subroutines add() and multiply() that will add or multiply its arguments and print the result to screen.

  Give appropriate to string methods for all classes

create a class Employee with a name and salary.give appropriate to String methods for all classes

  Question 1a explain the following biometric techniques- i

question 1a explain the following biometric techniques- i retina scan ii fingerprint scan iii iris scan. your answer

  Estimating the running time of quicksort

The running time of quicksort may be improved in practice by taking the benefit of the fast running time of the insertion sort when its input is "nearly" sorted.

  Techniques for analyzing the costs and benefits

Briefly compare and contrast the four techniques for analyzing the costs and benefits of a proposed system. What do you see as particular strengths and weakness of each method?

  Program that outputs the winner of the election

Write down a program that allows the user to enter the last names of five candidates in a local election and the votes received by each candidate. The program should then output each candidate's name, the votes received by that candidate, and the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd