The propagation speed on the bus is 25x108 ms calculate the

Assignment Help Computer Engineering
Reference no: EM13469888

Assume you want to transfer a file containing 500,000 bytes from one computer to another on a bus topology local network. Assume the two computers are a distance D apart, that the bus data rate is B bps, and each frame is P bits long, where 80 of these bits are occupied by the header and trailer information. Each frame of the file must be acknowledged with a 96-bit frame (2 data bytes) before the next is sent. The propagation speed on the bus is 2.5x108 m/s. Compute the total time necessary to transfer the file for the following values:

a) D = 100m, B = 1Mbps, P = 256 bits

b) D = 1km, B = 10Mbps, P = 512 bits

c) D = 100m, B = 40Mbps, P = 1024 bits

d) D = 1km, B = 100Mbps, P = 10,000 bits

Reference no: EM13469888

Questions Cloud

Interview 3 criminal justice professionals from different : interview 3 criminal justice professionals from different areas of the criminal justice field in your local
In a 5 bit crc error detecting scheme suppose that we : in a 5 bit crc error detecting scheme assume we choose the generating bit sequence as 11011.a encode the bit stream
As the prevalence of social media continues to rise : as the prevalence of social media continues to rise consumers are recognizing ways in which social media can direct
Educate mary about date rape using statistics and : you have decided to speak with the prosecutor mary on behalf of maureen the college student who was the victim of date
The propagation speed on the bus is 25x108 ms calculate the : assume you want to transfer a file containing 500000 bytes from one computer to another on a bus topology local
Describe what is occuring at nanoscale during energy : sodium hydroxide reacts with sulfuric acid to produce sodium sulfate and water. how many grams of sodium hydroxide are
The assaults among inmates have risen 30 over the past : you are the new warden assigned to a closed-security prison. this prison has been overwhelmed with security lapses
A student measures conductivity of a kno3 solution and : a student measures the conductivity of a kno3 solution and determines it to be a strong electrolyte. the student
What methods of adr would be available to pursue which of : write a memo on a state not federal level business dispute. describe as if you were writing a white paper for your

Reviews

Write a Review

Computer Engineering Questions & Answers

  A palindrome consists of a word or deblanked

A palindrome consists of a word or deblanked, unpunctuated phrase that is spelled exactly the similar when the letters are reversed. Write a recursive function that returns a value of 1 if its string argument is a palindrome.

  Discuss how understanding and being able to apply a

discuss how understanding and being able to apply a variety of technologies for distance and digital learning will help

  What is the specialization of Dottie's Tax facility

What is the specialization of Dottie's Tax facility At least 6 returns? (Round z-score computation to 2 decimal places and your final answer to 4 decimal places.)

  What is the round number when the system becomes idle

Explain why worst-case fair WFQ can have the absolute fairness bound and what is the round number when the system becomes idle? When the system is idle? Justify your answer.

  What do you mean by the concept of "code reuse"

What is meant by the concept of "code reuse"? consider some possible ways in which code may be reused. Do you think this concept is an important one.

  Write down a two page proposal for the backhaul connecting

write a two page proposal for the backhaul connecting several campuses for your company in one metropolitan area. all

  Clarify security mechanisms available for a database

Clarify security mechanisms available for a database

  Why is it significant to define the primary keys of a file

your supervisor has approved your normalized versions of the database. your team members were given copies. one of the

  How to generate paper for pair of public or private rsa key

How to generate paper for a pair of public or private RSA keys? The high-class reporter for foreign affairs learned about asymmetric cryptography, and proposed to security team at the paper to generate for a pair of public or private RSA keys.

  Implement the playexpert mode of the game

Whether or not you have managed to implement the playExpert mode of the game. If you do not manage to implement it you should carry on with the rest of the questions in novice mode.

  Amazon kindle changed the number of print books

Has popularity of the Amazon Kindle changed number of print books Kindle users buy.

  Why is it difficult to conduct a qualitative risk assessment

Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd