Suppose two hosts, A and B, are separated by 7,500 kilometers and are connected by a direct link of R = 10 Mbps. Suppose the propagation speed over the link is 2.5 x 10 8 meters/sec. Consider sending a large packet of 500,000 bits from Host A to Host B. How many milliseconds (ms) does it take before the receiver has received the entire 500,000-bit file?

Answers

Answer 1
Answer:

Answer:

50 ms (milliseconds) will be taken in total to take the entire file by user.

Explanation:

In Computer networks, propagation delay is defined as the time in which a packet is sent from sender to receiver completely. It is computed by taking the ratio of link length and propagation speed.

We know that:

BDP(in bits) = total bandwidth (in bits/sec) * trip time(in sec)

Now according to given condition we have:

Bandwidth = R = 10 Mbps = 10,000,000 bps

BDP = 500,000 bits

For finding Propagation Delay:

Propagation Delay = BDP/ R

Propagation Delay = 500,000/10,000,000 sec

Propagation Delay = 0.05 sec

Converting in milliseconds:

Propagation Delay = 50 ms

Hence. the delay would be 0.05 seconds and in milliseconds they will be equal to 50 ms


Related Questions

You are experiencing issues when trying to transfer files between two computers using FTP. What could be the potential cause(s) of the issue
To return the value of the cell D8, the formula should be OFFSETA1=________.
Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say "You have a dog with a total of 1 pet(s)" if they enter dog, and so on. Sample Run: User enters: lemur parrot cat rock Outputs: You have a lemur with a total of 1 pet(s) You have a parrot with a total of 2 pet(s) You have a cat with a total of 3 pet(s)
In an e-credit card transaction the clearinghouse plays the following role:A. validates and verifies the sellers payment informationB. initiates the transfer of moneyC. transfers funds between the sellers bank and the buyers bankD. all of the above
Write a program that takes an integer as input, representing a year in school. Output "Elementary school" for 0-5, "Middle school" for 6-8, "High school" for 9-12, "College" for 13-16, and "Post-secondary" for 17 and higher. Output "Invalid" for negative input. If the input is 7, the output is:

When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirements have been approved. Suggest a model of a pro- cess for making these modifications that will ensure that the requirements document and the system implementation do not become inconsistent.

Answers

Answer:

The Agile model

Explanation:

We can point out that this is all about the software development lifecycle model. In the software developmental lifecycle, the agile model is the most suited model that can be used to bring changes as per the requirement.

It is the model that provides huge flexibility as the changes can be made to the software even if the application is running. Moreover, this model follows documentation regarding the process of bringing the changes to the software. And even the new changes should pass the quality assurance test in order to go to the production phase.

What this does is that it actually ensures that your application is fit and is consistent to handle and perform operations.

Which of the following statements describes a limitation of using a computer simulation to model a real-world object or system?a. Computer simulations can only be built after the real-world object or system has been created.
b. Computer simulations only run on very powerful computers that are not available to the general public.
c. Computer simulations usually make some simplifying assumptions about the real-world object or system being modeled.

Answers

Answer:

The answer is "Option c".

Explanation:

Computer simulation, use of a machine to simulate a system's vibration signals by another modeled system's behaviors. A simulator employs a computer program to generate a mathematical model or representation of a true system. It usually gives a lot of simplifications concerning the physical image or system that is modeled, so this statement describes the limitation of using a computer simulation in modeling a real-world object or process.

Andre is finding working in an online group challenging because there are people in the group from many different cultural backgrounds. Which are the three major areas that present challenges to students in such situations?​

Answers

Answer:

When working in multicultural groups, students may find challenges in the areas of language barriers, social behavior expectations, and communication style differences.

Explanation:

Answer:

Different Communication Styles

Different Attitudes Toward Conflict

Different Approaches to Completing Tasks

Different Decision-Making Styles

Different Attitudes Toward Disclosure

Different Approaches to Knowing

Explanation:

What is time-slice? How is the end of the time slice indicated?

Answers

Time-slice is a part of the preemptive process - a scheduling algorithm that will return from the running state to the ready state in a system that can favor another process in the meantime (in order to satisfy the scheduling policy's priority constraint!!!!).

Time- slice is that period of time in which a process is allowed to run in a preemptive multitasking system. The end of one is indicted by the occurrence of a signal called.

Write a program that removes all non-alpha characters from the given input. Ex: If the input is: -Hello, 1 world$! the output is: HelloworldAlso, this needs to be answered by 11:59 tonight.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes in a string as a parameter, loops through the string and checks if each character is an alpha char. If it is, then it adds it to an output variable and when it is done looping it prints the output variable. A test case has been provided and the output can be seen in the attached image below.

def checkLetters(str):

   output = ''

   for char in str:

       if char.isalpha() == True:

           output += char

   return output

Given the acquisition environment and circumstances described in the BSVD Program documents, do you recommend contracting without providing for full and open competition for the BSVD bio-sensor contract? Preface your response with either of the following: "Yes, we recommend contracting without providing for full and open competition" or "No, we do not recommend contracting without providing for full and open competition." Note: References to the specific FAR exceptions to full and open competition are not necessary, as these will be addressed in question 2(b). Focus your response on the facts presented in the case and what you find appropriate in relation to conducting full and open competition or limiting competition. Provide at least three facts from the case that support your rationale and explain how these facts lead to your conclusion.

Answers

Answer:

No, we do not recommend contracting without providing for full and open competition. There is sufficient evidence that the necessary BSVD is only available from the original source, NanoTech, and that use of any other contractor would create unacceptable delays in fulfilling the need.