Compute the bandwidth requirements for a live event

Assignment Help Operating System
Reference no: EM1379555

Compute the bandwidth requirements for a live event that is streamed over the Internet based on the information below.

Assume you are the network administrator for an Internet Service Provider (ISP). Your company has been asked to provide bandwidth for a live event produced by one of your clients.

You have been asked to calculate the total data transfer required for the event. You have also been asked to verify that your Internet connection can support the maximum estimated concurrent listeners. You have a 45-megabits-per-second (Mbps) connection to the Internet (a T3 circuit).

Event details are as follows.

* Time of the event: 6:00 P.M.-8:00 P.M.
* Encoding rate: 22 kilobits per second (Kbps)
* Average length of play: 60 minutes
* Total listeners: 1,500
* Concurrent listeners: 1,200

1. Compute the total data transfer for the live event.
2. Compute the required internet connection bandwidth.

 

Reference no: EM1379555

Questions Cloud

Creating hipo charts and decision tables : Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,
Question about vpn communications : Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network.
Catching exception : Create a program that shows how various exceptions are caught with catch Exception
Effects of spyware and adware : Describe the effects of spyware and adware. Discuss how has spyware and adware impacted the public's confidence in the security of internet?
Compute the bandwidth requirements for a live event : Compute the bandwidth requirements for a live event that is streamed over the Internet based on the information given below.
Pros and cons of using embedded uid and pw : Think about an embedded user id and password which provides me access to a client/server environment. Discuss the pros and cons of using an embedded uid and pw?
Drawbacks and benefits of outsourcing : Discuss the drawbacks and benefits of outsourcing, which has become one of the hot issues today from the viewpoint of Quality Assurance.
Automate or automated patch deployment : Discuss and define Automate or Automated patch deployment?
Securing standard telecommunications line vs voip connection : Determine the difficulty(s) of securing a standard telecommunications line vs. securing a VOIP connection?

Reviews

Write a Review

Operating System Questions & Answers

  Explain trade-off between memory use and cpu overhead

Remembering that there's a trade-off between memory use. Then give an example where doing so will cause throughput to suffer.

  Disk scheduling algorithm

Simulation of Elevator and Shortest Seek Time First

  Analyse the different methods for collecting data

Analyse the different methods for collecting data Explain by taking examples 3 types of Sampling techniques.

  Information-level design for college requirements

Database at college is needed to support following requirements. Complete information-level design for this set of requirements. Use your own experience to find out any constraints you require which are not stated in problem

  Give three advantages of virtual machine

In different communications models, communication may take place using either "message passing" or "shared memory". Distinguish between "message passing" and "shared memory", illustrating your answer with a diagram Give three advantages of virt..

  Security of information and data in an organization

The final security measure my company implements well is monitoring internet usage through limiting the access for most workers to search websites that are not related to the company.

  Applications for the programs

Applications are the programs that make our computers powerful. Not counting Microsoft Office, what are some of the new applications that you see making a big difference to computer users in next some years?

  Explaining first-in-first-out scheduling

Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.

  Calculate effective access time of system

Assuming fetches to main memory are started in parallel with look-ups in cache, calculate the effective (average) access time of this system.

  Write the start-up steps in windows nt

Write the start-up steps in Windows NT. Provide estimate for the capital investment needed in computer forensics for a 2,000,000 population.

  Securing standard telecommunications line vs voip connection

Determine the difficulty(s) of securing a standard telecommunications line vs. securing a VOIP connection?

  Comprehensive network installation plan

Determine the main steps that should be included in a comprehensive network installation plan. In your opinion, what are the 2most important steps in ensuring success of the network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd