Question

In: Computer Science

A message consists of 8,000,000 bytes. The sender’s network adapter can transmit at a rate of...

A message consists of 8,000,000 bytes. The sender’s network adapter can transmit at a rate of 100,000 bytes per a second. The receiver’s network adapter can receive 40,000 bytes per second.   It takes 20 ms for data to move across the network.   Assuming no data is lost on the way, how long does it take for the message to read in by the receiver?

Solutions

Expert Solution

Hi, I would love to answer you with this question. Hope you like an answer and get a clear idea related to the same. So not wasting much time lets get started towards the question.

Let us first what we need to calculate and how, Then we will be moving towards the calculations :

We need to calculate the transmission delay for the sender and then the reciever who will recieve the data fully then this delay would also be calculated and with this the total propogation delay will be summed which is been provided as 20ms.

Now,

Senders Transmission Delay = Data size/Bandwidth 8,000,000 bytes / 100,000 bytes/sec = 80 sec = 80,000 ms

Recievers Transmission Delay = 8,000,000 bytes / 40,000 bytes/sec = 200 sec = 200,000 ms

Propogation Delay = Distance/Transmission speed 20ms(given)

Total time to read full data by the reciever is = 80,000 + 200,000+ 20 = 280,020 ms

This is the total calculation of the above question.

Please like an answer and do comment for any queries.

Thanks and Happy to help :)

HAPPY LEARNING


Related Solutions

a) What is alphanumeric information? >>> b) Explain how many bytes it will take to transmit...
a) What is alphanumeric information? >>> b) Explain how many bytes it will take to transmit “Go team” without the quotation marks. >>> c) Explain how many bytes it will take to transmit “Hello World!” without the quotation marks. >>> d) Go to a search engine and find a converter to represent characters in ASCII. What are the 7-bit ASCII codes for “Hello world!” without the quotation marks? (Check: H is 1001000.) Show this in a table with two columns....
a.Agent X and Agent Y are two spies who want to transmit a secret message to...
a.Agent X and Agent Y are two spies who want to transmit a secret message to their headquarters. In order to ensure secrecy, half of this message is to be transmitted in Urdu by Agent x while the other half in Pashto by Agent Y Both halves when decoded together at the headquarters can convey the complete information and therefore must be sent in a single transmission They have an AM transmitter but it has one problem that it can...
You have just finished installing a network adapter and booted up the system, installing the drivers....
You have just finished installing a network adapter and booted up the system, installing the drivers. You open File Explorer on a remote computer and don’t see the computer on which you installed the new NIC. What is the first thing you check? The second thing? Has IPv6 addressing been enabled? Is the computer using dynamic or static IP addressing? Do the lights on the adapter indicate it’s functioning correctly? Has the computer been assigned a computer name? You have...
Suppose we want to transmit the message 0010 1101 and detect transmission errors using the CRC...
Suppose we want to transmit the message 0010 1101 and detect transmission errors using the CRC divisor polynomial (x3+x2+1). A.) [15 marks] Determine the bit string that should be transmitted. B.) [15 marks] If the leftmost 1-bit of the transmitted string is inverted due to noise on the link, what is the result of the receiver's CRC calculation?
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data...
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data transmitted via a low power radio. A byte is either sent correctly or is distorted by interference. The car locks are only opened if all 4 bytes are received correctly. Let C be the event that a byte is received correctly and F be the event that the byte is distorted in transmission. Then CCCC would mean that all four bytes were received correctly...
Why is UDP/IP used to transmit and receive packetized voice signals over and IP network and...
Why is UDP/IP used to transmit and receive packetized voice signals over and IP network and not TCP/IP used in VoIP?
An encryption-decryption system consists of three elements: encode, transmit, and decode. A faulty encode occurs in...
An encryption-decryption system consists of three elements: encode, transmit, and decode. A faulty encode occurs in 0.7% of the messages processed, transmission errors occur in 1% of the messages, and a decode error occurs in 0.1% of the messages. Assume the errors are independent. Round your answers to four decimal places (e.g. 98.7654). (a) What is the probability of a completely defect-free message? (b) What is the probability of a message that has either an encode or a decode error?
28) Ras is a ________, which can ______ cancer development when activated constitutively. A) Adapter protein...
28) Ras is a ________, which can ______ cancer development when activated constitutively. A) Adapter protein of the insulin signaling pathway, promote B) Monomeric G-protein, suppress C) Heterotrimeric G-protein, promote D) Monomeric G-protein, promote 29) Which of the following is not an event happened during prophase? A) The nuclear lamina is disassembled by depolymerization of the lamin filaments. B) Fragmentation of Golgi complex and ER. C) Chromosomal material condenses to form compact mitotic chromosomes D) Chromosomal microtubules attach to kinetochores....
In very simple cryptograph, the intended message sometimes consists of the first letterof very word in...
In very simple cryptograph, the intended message sometimes consists of the first letterof very word in upper case in a string. Write a function cryptmessage that will receive a string or a character vector with the message and return the encrypted message. >>messagestring=' the Early songbird tweets '; >>m=cryptmessage(messagestring) m=' TEST' Please put it in MATLAB
A direct-mapped cache consists of 8 blocks. Byte-addressable main memory contains 4K blocks of 8 bytes...
A direct-mapped cache consists of 8 blocks. Byte-addressable main memory contains 4K blocks of 8 bytes each. Access time for the cache is 22ns, and the time required to fill a cache slot from main memory is 300ns. (This time allows us to determine the block is missing and bring it into cache.) Assume a request is always started in parallel to both cache and to main memory(so if it is not found in cache, we do not have to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT