Question

In: Computer Science

Suppose a network access link of 1 Mbps capacity is being shared among 10 users through...

Suppose a network access link of 1 Mbps capacity is being shared among 10 users through packet-switching and each user has 20% probability of using the link at any time. Assuming the link bandwidth is shared equally among its active users, what is the probability (in %) that each user is experiencing a bandwidth equal to or above 300 Kbps (Kilobits per second)?

Solutions

Expert Solution

Let the maximum active users allowed be n, for the required bandwidth requirements.

Then, we have :

Thus, the maximum number of users allowed are 1, 2, 3.

Now,

  • probability that a user is active, p = 0.20
  • probability that a user is not active = 1 - 0.20 = 0.80

Also, we consider each case 1 by 1.

1 user is online, and 9 users are offline :

We can select 1 out of 10 users, in 10C1 ways.

Thus, the probability for this case

= 10C1 * p * (1 - p)9

= 0.2684

2 users are online, and 8 users are offline :

We can select 2 out of 10 users, in 10C2 ways.

Thus, the probability for this case

= 10C2 * p2 * (1 - p)8

= 0.3020

3 users are online, and 7 users are offline :

We can select 3 out of 10 users, in 10C3 ways.

Thus, the probability for this case

= 10C3 * p3 * (1 - p)7

= 0.2013

Thus, total probability

= 0.2684 + 0.3020 + .2013

= 0.7717

= 77.17 %


Related Solutions

Consider a circuit-switching scenario in which Ncs users, must share a link of capacity 150 Mbps....
Consider a circuit-switching scenario in which Ncs users, must share a link of capacity 150 Mbps. Each user alternates between periods of activity when the user generates data at a constant rate of 20 Mbps and periods of inactivity when he generates no data. Suppose further that he is active only 20% of the time. Assume a circuit switched TDM. What is the maximum number of circuit-switched users that can be supported? Assume packet switching is used for the remaining...
A. There are 10 users whose traffic is being multiplexed over a single link with a...
A. There are 10 users whose traffic is being multiplexed over a single link with a capacity of 2 Mbps. Suppose each user generates 100 kbps when busy, but is only busy (i.e., has data to send) 10% of the time. Would circuit-switching or packet-switching be preferable in this scenario? Why? B. Continuing the previous problem, assume that the link capacity is still 2 Mbps, but the amount of traffic each user has to send when busy is increased to...
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
Suppose a department has determined that some users have gained unauthorized access to the computing system....
Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $2,000,000 with 5% likelihood per year. One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is is $50,000 with 80% effectiveness. Here is the summary of risk and...
I have an access link to the internet (Institutional Router to Internet Router) that is 1...
I have an access link to the internet (Institutional Router to Internet Router) that is 1 Gbps access link. Suppose that on my network there are typically 1000 Requests/second going to the Internet that are each 1 Mbits. Calculate the traffic intensity on the access link. What does this number imply about delays on my network?
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a...
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a router to the EE Department network with address 123.0.0.0 and connect CNRL network through a router to the EE Research network with address 222.22.2.0 . Please draw a diagram for this network connection. Choose IP addresses for each interface of each router and show several hosts on each network, with their IP addresses. Please briefly explain each step.
Question 1 (10 pts). The genetic linkage among 3 gene loci in horses is being studied....
Question 1 (10 pts). The genetic linkage among 3 gene loci in horses is being studied. The loci are part of autosomal chromosomes and they MIGHT be on the same pair of homologous chromosomes. There are two alleles at each locus. At the coat color locus, allele B is for black, and b is for white. At the height locus, allele H is for tall, and h is for short. At the tail locus, allele T is for long, and...
Task 4 [10 pts] Broadcasting Messages to All Clients (Shared Variable Among Threads) Modify the server...
Task 4 [10 pts] Broadcasting Messages to All Clients (Shared Variable Among Threads) Modify the server code so that when the server sends a message, that message is sent to all connected clients #include<stdio.h> #include<string.h> //strlen #include<stdlib.h> //strlen #include<sys/socket.h> #include<arpa/inet.h> //inet_addr #include<unistd.h> //write #include<pthread.h> //for threading , link with lpthread #define MAX 80 #define PORT 6543 #define SA struct sockaddr // Function designed for chat between client and server. void join( pthread_t *thread_id) { if(!pthread_join( *thread_id , NULL)) printf("thread %ld...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
Suppose that among a group of sick people 10 have a headache (h), 10 have a...
Suppose that among a group of sick people 10 have a headache (h), 10 have a stomach ache (s), and 10 have a fever (f). If 4 have (h) and (s), 4 have (s) and (f), 4 have (h) and (f), and 1 person has all three symptoms, then there were 19 people in this group who had at least one of the three symptoms. True or False?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT