Determine time take to send file between two hosts

Assignment Help Computer Networking
Reference no: EM1370318

1. Suppose two hosts, A and B, are separated by 10,000 kilometers and are connected by a direct link of R =1 Mbps. Suppose the propagation speed over the link is 2.5?108 meters/sec.

a. Calculate the bandwidth-delay product, R?tprop.
b. Consider sending a file of 400,000 bits from Host A to Host B. Suppose the file is sent continuously as one big message. What is the maximum number of bits that will be in the link at any given time?
c. Provide an interpretation of the bandwidth-delay product.
d. What is the width (in meters) of a bit in the link? Is it longer than a football field?
e. Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.

2. Refer again to problem 1.

a. How long does it take to send the file, assuming it is sent continuously?
b. Suppose now the file is broken up into 10 packets with each packet containing 40,000 bits. Suppose that each packet is acknowledged by the receiver and the transmission time of an acknowledgment packet is negligible. Finally, assume that the sender cannot send a packet until the preceding one is acknowledged. How long does it take to send the file?
c. Compare the results from (a) and (b).

Reference no: EM1370318

Questions Cloud

Write program to accept data for each student in school : Write the program which accepts data for each student in school- student ID, classroom number, and score on achievement test. Create program which lists total points scored for each of the 30 classrooms.
Help with homework business communcation : Make a list of at least three advantages and three disadvantages of communicating a message for each of the general methods (spoken word, written).
Explain what type of person becomes this type of risk taker : Explain What type of person becomes this type of risk taker and What challenges did he or she face and overcome and What failures did this person have
Improving listening skills : Analyze your own listening habits and what are your strengths and weaknesses?
Determine time take to send file between two hosts : Assume two hosts, A and B, are separated by 10,000 kilometers and are connected by direct link of R =1 Mbps. Assume propagation speed over link is 2.5?108 meters/sec .How long does it take to send file, suppose it is sent continuously?
Determining firm cost of capital : What is firm's cost of capital at the various combinations of debt and equity? What is the firm's optimal capital structure? Construct a balance sheet showing that combination of debt and equity financing.
Find the maximum and average levels of inventory : A company yearly sells 7,890 units. The cost of placing an order is $100 and the carrying costs are $2 a unit. What is the EOQ, the duration of the EOQ,
Similarities and differences in process models : Similarities and differences in three of the process models and Resource: The design process models discussed in The Design Agenda
Formulation of demand curve : A company wants to prepare the demand curve for its product that it is selling. How would it get the information to prepare the schedule? How could a company prepare the demand curve for the new product that has not been seen by the public?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining decryption function

Determine the decryption function. What is the decrypted plaintext?

  Explain benefits of providing synchronization tool

Using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.

  Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

  Process by which ip addresses are assigned to computers

How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions."

  How internet works for organization-s office administration

What would be needed along with precautionary measures, and an overview of how the Internet works for the organization's office administration.

  Develop a simple backbone and determine the total cost

Develop a simple backbone and determine the total cost (i.e., select the backbone technology and price it, select the cabling and price it.

  Creating plan to set up local area network

Create a plan to set up a local area network. Design a boardroom-quality Microsoft® PowerPoint® presentation of 10-12 slides detailing your plan.

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Explain how to troubleshoot a network

You have been hired to aid troubleshoot a network. Users in this customer site have being experiencing intermittent problems.

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Subnets diagram working lan depicting network subnets

Subnet classful Class C network into 2 subnets Diagram working LAN depicting two network subnets (can be in Word of Visio) Network should include

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd