Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Two computers using TDM take up turns to send 100-bytes packet over a shared channel that operates at 64000 bits per second. The hardware takes 100 microseconds after one computer stops sending before the other can begin. How long will it take for each computer to send one megabyte data file?
Channel rate is 64000 bits per second or 8000 bytes/second.
Thus 1000 bytes size packet will take 1000/8000 seconds which is .125 seconds. One megabyte file will have 1000000/1000 = 1000 packets of 1000 bytes size each. Well Two system sending one megabyte file each implies 2000 packets will be sent. Hence, 2000 packets will get 2000 X .125 = 250.000 seconds.
Hardware gets 100 micro second or 0.001 seconds.
Computer sends packets turn by turn in between each two consecutive packets. Here will be 0.001 second gap for 200 packets gap is 2000 X 0.001 = 2.0 seconds.
Total time will be 250 + 2 = 252 seconds for a computer.
There can be more than one node at the highest level in the structure. False. One can describe only single node at the highest level in the structure on LDB
The term 'page traffic' describes? Ans. Page Traffic describes the movement of pages in and out of memory.
Hyper-threading works by duplicating those sections of processor that kept the architectural state-but not duplicates the main implementation resources. This allows a Hyper-threadi
Q Convert the following DECIMAL numbers into HEXADECIMAL, double check by converting the result HEXADECIMAL to DECIMAL. a) 24 b) 547.56
What is Traffic Engineering? Traffic engineering gives the basis for analysis and design of telecommunication network to carry a specified traffic at an exact loss probability
Q. SPMD model for programming? A normal assumption was that it must be possible and not too hard to capture the SPMD model for programming MIMD computers in data parallel langu
Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a
1. Insert the following characters with their respective priorities (shown as ordered pairs) into an empty treap: (K, 17), (F, 22), (P, 29), (M, 10), (N, 15), (L, 26), (G, 13),
There are no needs.. If you need to use a Viewport you can! If you want to render components into divs... you can do that aswell.
Q. Explain about Theta Notation? Theta Θ Notation : The set Θ (g(n)) comprises all functions f(n) for that there exist positive constants c1,c2 such that f(n) is squeezed in b
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd