Calculate link utilisation - exchanging packets, Computer Networking

Assignment Help:

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is 50ms. In the space below, draw a diagram illustrating the timing of Source and Destination exchanging packets and acknowledgments using a stop-and-wait protocol. Assume that packets are only sent from source to destination and that acknowledgments (of negligibly small size) are sent back immediately after the data frame is received.  

792_Calculate Link Utilisation - Exchanging Packets.png

b)  Calculate link utilisation (proportion of time the channel is actually used for transmission) for the stop-and-wait case.


Related Discussions:- Calculate link utilisation - exchanging packets

Power supply system in satellite system, POWER SUPPLY SYSTEM IN  SATELLITE...

POWER SUPPLY SYSTEM IN  SATELLITE SYSTEM Satellite Earth Station relies on the public power supply system. Two generators (1+1) of 250 KVA each in parallel connection having fa

Firewall architectures-screened host architecture, Screened Host Architectu...

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the

Describe the dsdm life-cycle with a suitable diagram, Question : (a) De...

Question : (a) Describe how ‘prototyping' is important to RAD. (b) List main features of ‘prototyping'. (c) List main principles of DSDM. (d) Describe the DSDM life-

Network Topology, What are the different types of network topologies

What are the different types of network topologies

What is client/server, Clients and Servers are dividing logical entities th...

Clients and Servers are dividing logical entities that work together over a network to accomplish a task. Many systems with very dissimilar architectures that are connected togethe

Define character stuffing, Define Character Stuffing? In byte stuffing ...

Define Character Stuffing? In byte stuffing (or character stuffing), a particular byte is added to the data section of the frame when there is a character with the same pattern

What is mpmm, MPMM is a Project Management Methodology which gives a comple...

MPMM is a Project Management Methodology which gives a complete "framework" for managing projects. This framework gives you with a step-by-step walkthrough of the phases, activitie

Advantages of firewall, Firewall The NAT router allows receiving of num...

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd