Calculate link utilisation - exchanging packets, Computer Networking

Assignment Help:

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is 50ms. In the space below, draw a diagram illustrating the timing of Source and Destination exchanging packets and acknowledgments using a stop-and-wait protocol. Assume that packets are only sent from source to destination and that acknowledgments (of negligibly small size) are sent back immediately after the data frame is received.  

792_Calculate Link Utilisation - Exchanging Packets.png

b)  Calculate link utilisation (proportion of time the channel is actually used for transmission) for the stop-and-wait case.


Related Discussions:- Calculate link utilisation - exchanging packets

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol

Analysis of sort_bitonic, The bitonic sorting network needed log n number o...

The bitonic sorting network needed log n number of stages for performing the task of sorting the list. The first n-1 stages of the circuit are able to sort two n/2 numbers and the

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

State in brief about the graceful degradation, State in brief about the Gra...

State in brief about the Graceful degradation With FDMA or TDMA, a fixed number of users can concurrently access the system. Though, with CDMA, as more user concurrently access

Describe networking, Describe networking. Networking refers to the inte...

Describe networking. Networking refers to the inter connection among computers and peripherals for data communication. Networking can be done using wired cabling or by wireless

Delivering message through lan, Delivering message through LAN: We hav...

Delivering message through LAN: We have to devise method for delivering message through LAN phase to single, specific destination device. Sending device uses a hardware addres

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Explain about nonboundary-level masking, Q. Explain about Nonboundary-Level...

Q. Explain about Nonboundary-Level Masking? Nonboundary-Level Masking Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet addres

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd