Question

In: Computer Science

Suppose a network access link of 1 Mbps capacity is being shared among 10 users through...

Suppose a network access link of 1 Mbps capacity is being shared among 10 users through packet-switching and each user has 20% probability of using the link at any time. Assuming the link bandwidth is shared equally among its active users, what is the probability (in %) that each user is experiencing a bandwidth equal to or above 300 Kbps (Kilobits per second)?

Solutions

Expert Solution

Let the maximum active users allowed be n, for the required bandwidth requirements.

Then, we have :

Thus, the maximum number of users allowed are 1, 2, 3.

Now,

  • probability that a user is active, p = 0.20
  • probability that a user is not active = 1 - 0.20 = 0.80

Also, we consider each case 1 by 1.

1 user is online, and 9 users are offline :

We can select 1 out of 10 users, in 10C1 ways.

Thus, the probability for this case

= 10C1 * p * (1 - p)9

= 0.2684

2 users are online, and 8 users are offline :

We can select 2 out of 10 users, in 10C2 ways.

Thus, the probability for this case

= 10C2 * p2 * (1 - p)8

= 0.3020

3 users are online, and 7 users are offline :

We can select 3 out of 10 users, in 10C3 ways.

Thus, the probability for this case

= 10C3 * p3 * (1 - p)7

= 0.2013

Thus, total probability

= 0.2684 + 0.3020 + .2013

= 0.7717

= 77.17 %


Related Solutions

Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
I have an access link to the internet (Institutional Router to Internet Router) that is 1...
I have an access link to the internet (Institutional Router to Internet Router) that is 1 Gbps access link. Suppose that on my network there are typically 1000 Requests/second going to the Internet that are each 1 Mbits. Calculate the traffic intensity on the access link. What does this number imply about delays on my network?
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a...
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a router to the EE Department network with address 123.0.0.0 and connect CNRL network through a router to the EE Research network with address 222.22.2.0 . Please draw a diagram for this network connection. Choose IP addresses for each interface of each router and show several hosts on each network, with their IP addresses. Please briefly explain each step.
Question 1 (10 pts). The genetic linkage among 3 gene loci in horses is being studied....
Question 1 (10 pts). The genetic linkage among 3 gene loci in horses is being studied. The loci are part of autosomal chromosomes and they MIGHT be on the same pair of homologous chromosomes. There are two alleles at each locus. At the coat color locus, allele B is for black, and b is for white. At the height locus, allele H is for tall, and h is for short. At the tail locus, allele T is for long, and...
Task 4 [10 pts] Broadcasting Messages to All Clients (Shared Variable Among Threads) Modify the server...
Task 4 [10 pts] Broadcasting Messages to All Clients (Shared Variable Among Threads) Modify the server code so that when the server sends a message, that message is sent to all connected clients #include<stdio.h> #include<string.h> //strlen #include<stdlib.h> //strlen #include<sys/socket.h> #include<arpa/inet.h> //inet_addr #include<unistd.h> //write #include<pthread.h> //for threading , link with lpthread #define MAX 80 #define PORT 6543 #define SA struct sockaddr // Function designed for chat between client and server. void join( pthread_t *thread_id) { if(!pthread_join( *thread_id , NULL)) printf("thread %ld...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
An 10-bit password is required to access a system. A hacker systematically works through all possible...
An 10-bit password is required to access a system. A hacker systematically works through all possible 10-bit patterns. Let ? be the number of patterns tested until the correct password is found. (a) Find ?? and the pmf of ?. Let ? be the event that the password has not been found after 24 tries. (b) Find the conditional pmf of ? given ?. (c) Find ?(?) and ?(? | ?).
Suppose that among a group of sick people 10 have a headache (h), 10 have a...
Suppose that among a group of sick people 10 have a headache (h), 10 have a stomach ache (s), and 10 have a fever (f). If 4 have (h) and (s), 4 have (s) and (f), 4 have (h) and (f), and 1 person has all three symptoms, then there were 19 people in this group who had at least one of the three symptoms. True or False?
Suppose two players play the following prisoner's dilemma for 10 periods (periods 1 through 10). C...
Suppose two players play the following prisoner's dilemma for 10 periods (periods 1 through 10). C D C 3,3 -1,4 D 4,-1 0,0 Suppose that players simultaneously choose their strategy before the repeated game, and can't change it once the repeated game has started. Players can choose one of the three following strategies as defined in class: • Always Defect • Grim-Trigger • Tit-For-Tat (a) Draw the 3×3 matrix game with the payoffs for each strategy pair calculated over the...
Suppose the genetic mutation for being at risk for canine intervertebral disk disease (IVDD) among chondrodystrophy...
Suppose the genetic mutation for being at risk for canine intervertebral disk disease (IVDD) among chondrodystrophy dogs (long bodied dogs) is 9%. a. Find the probability that out of 10 randomly sample hot-dog shaped dogs, at least 1 will have IVDD. Suppose we take a random sample of 150 chondrodystrophy dogs and observe 17 of them to have the genetic mutation. Calculate 95% confidence interval for the true population proportion of chondrodystrophy dogs that have the genetic mutation for being...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT