Calculate the efficiency of stop and wait arq, Computer Networking

Assignment Help:

(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long.

a)  Calculate the efficiency of stop-and-wait ARQ in a system that transmits at R=1 Mbps and reaction time 2(Tprop + Tproc) of the following: 1ms, 10ms, 100ms, and 1 second. 

b)  Repeat if R=1 Gbps.              

(ii)  Please discuss what options does an ARQ protocol have when it detects a frame with errors?

(iii)  In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip.   

a)  What is the bandwidth-delay product? 

b)  If the system data frames are 1000 bits in length, what is the utilization percentage of the link? 

c)  What is the utilization percentage of the link if the link uses Go-Back-N ARQ with a 15-frame sequence?

 

 


Related Discussions:- Calculate the efficiency of stop and wait arq

What do you meant by triple x in networks, What do you meant by "triple X" ...

What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine

Explain file transfer protocol, Q. Explain File Transfer Protocol? - Fi...

Q. Explain File Transfer Protocol? - File Transfer Protocol (FTP) is a TCP/IP client-server application for copying files from one host to another -- Establishes two connect

sorting circuit along with odd-even merging circuit, As we previously know...

As we previously know, the merge sort algorithm needs two circuits, i.e. one for merging and second for sorting the sequences. Thus, the sorting circuit has been derived from the a

Thread libraries, The most difficult representatives of shared memory progr...

The most difficult representatives of shared memory programming models are thread libraries present in mainly of the modern operating systems. Some examples for thread libraries ar

Describe any good security technology, Describe any good security technolog...

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

IP datagram, On a LAN where are IP Datagram transported?

On a LAN where are IP Datagram transported?

Explain the term ftp- file transfer protocol, Explain the term FTP: File T...

Explain the term FTP: File Transfer Protocol A very common method of moving files between two Internet sites. FTP is a special way to log in to another Internet site for pur

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd