Relationship between throughput and delay, Computer Networking

Assignment Help:

If a data packet switch has a queue of data packets waiting when a new packet reach. The new packet will be located on the whole queue and will have to wait while the switch forward the previous packets.

Delay and throughput are not completely dependent. As traffic in a computer network raise, delays raise a network that performs at close to 100% of its throughput capacity experiences severe time delay.

DELAY THROUPUT PRODUCT:

It is calculated as delay time multiplied by effective throughput. It calculates amount of data that can be represent in the network. In fast network with long delay times, sender can generate big amounts of data before receiver receives first bit.


Related Discussions:- Relationship between throughput and delay

What is multistation access unit, Multistation Access Unit (MAU) C...

Multistation Access Unit (MAU) Combines individual automatic switches May perhaps daisy chain to support more stations

Describe the importance of backups, Question: (a) Describe the importa...

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

Define the tasks for which sns is used, Define the tasks for which SNS is u...

Define the tasks for which SNS is used SNA can be used for the following types of tasks: -  Terminal access to mainframe and midrange computer applications. -  File trans

What are three ways to give login access to router, The three ways to give ...

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Parts count method calculation, M E T HOD OF CALCULATION It involves...

M E T HOD OF CALCULATION It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain t

Determine the switch in a physical ring, Switch In a physical ring ...

Switch In a physical ring configuration any disabled or else disconnected node can disable the entire network Use of a switch can permit the ring to bypass an inactive

What is kerberos in networking, What is Kerberos in Networking? It is a...

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

What is multi-mode fiber, What is Multi-mode fiber Multi-mode fiber use...

What is Multi-mode fiber Multi-mode fiber uses LEDs like the light-generating devices while single-mode fiber generally uses lasers. FDDI specifies the utilization of dual r

Programming with pvm, The Common method for writing a program with PVM is a...

The Common method for writing a program with PVM is as follows: A user writes one or more sequential programs in C, C++, or Fortran 77 having embedded PVM function (or subroutin

Whcih is the routing metric used by rip, Routing Information Protocol (RIP)...

Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd