Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled with a rate 1 Mbps. The bucket is initially filled to capacity with 1 Mb. How long can the computer transmit at the full 6 Mbps?
+1
vote
200
views
asked
Apr 13
in
Computer Networks
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Apr 13
by
(user.guest)
selected
Apr 17
by
(user.guest)
Best answer
The net outflow from the token bucket is 5Mbps. As a result, the time it takes for the full bucket to empty is 1Mb/5Mbps=0.2sec. Thus, during the first 0.2 seconds the computer transmits at the maximum 6-Mbps rate and then it switches to 1-Mbps.
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
2.9k
views
The data rate of 10Base5 is 10 Mbps. How long does it take to create the smallest frame? Show your calculation.
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
1.1k
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
3.7k
views
A microprocessor is clocked at a rate of 5 GHz. a. How long is a clock cycle? b. What is the duration of a particular type of machine instruction consisting of three clock cycles?
asked
Apr 9, 2020
in
Computer Architecture
by
anonymous
+2
votes
1
answer
4.9k
views
Imagine the length of a 10Base5 cable is 2500 meters. If the speed of propagation in a thick coaxial cable is 200,000,000 meters/second, how long does it take for a bit to travel from the beginning to the end of the network?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
22.4k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
434
views
Is the message integrity scheme based on HMAC susceptible to playback attacks? If so, how can a nonce be incorporated into the scheme to remove this susceptibility?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.2k
views
Duplicate: Three missionaries and three cannibals are on one side of a river, along with a boat that can hold one or two people. Find a way to get everyone to the other side, without ever leaving a group of missionaries outnumbered by cannibals.
asked
Aug 7, 2020
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
8.8k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
544
views
A microprocessor has an on - chip 2 - way set associative cache with a total capacity of 8 kByte. Each line in cache can store sixteen 8 - bit words. It has a total addressable space of 16 MBytes. Consider the following CPU instruction: Load AB1234h,
asked
May 29, 2021
in
Computer Architecture
by
anonymous
+2
votes
1
answer
8.8k
views
Host Aand B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
290
views
How to design a 4-input (A,B,C,D) digital circuit that will give its output a logic 1 only if the binary number formed at the input is between 2 and 9 (2&9 inclusive)?
asked
Nov 11, 2021
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
411
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7, 2021
in
Computer Networks
by
(user.guest)
0
votes
0
answers
246
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
225
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
204
views
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
asked
May 3
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
867
views
If a label in a connection-oriented service is n bits, how many virtual circuits can be established at the same time?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
1.8k
views
Assume a destination computer receives several packets from a source. How can it be sure that the fragments belonging to a datagram are not mixed from the fragments belonging to another datagram.
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
10.0k
views
Consider the circuit-switched network in Figure 1.13. Recall that there are 4 circuits on each link. Label the four switches A, B, C and D, going in the clockwise direction.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
622
views
The RAM is a temporal storage area in the computer system that usually contains the data that are being processed by the CPU. Briefly describe how the CPU and the RAM interacts to carry out their operation.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
0
votes
0
answers
189
views
Network Technology involves the use of data systems to manage and deliver digital resources over a computer network. From your point of view, which network technology is better for any case.
asked
May 25, 2021
in
Computer Networks
by
anonymous
+1
vote
0
answers
355
views
Recall that TCP can be enhanced with TLS to provide process-to-process security services, including encryption. Does TLS operate at the transport layer or the application layer?
asked
Feb 3
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.3k
views
If a physical address is 48 bits (6 bytes) what is the minimum header size at the data link layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
4.3k
views
The population of a certain country is known to increase at a rate proportional to the number of people presently living in the country.
asked
Sep 18, 2020
in
Maths & Statistics
by
(user.guest)
+2
votes
1
answer
1.7k
views
Consider a channel that can lose packets but has a maximum delay that is known. Modify protocol rdt2.1 to include sender timeout and retransmit. Informally argue why your protocol can communicate correctly over this channel.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
377
views
Signals will be exchanged between at the___________ of the TCP/IP Model? 1- network layer 2-data link layer 3-physical layer 4-application laye
asked
Jul 14, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
2.4k
views
While browsing at Billy Bob’s computer store, you overhear a customer asking Billy Bob what is the fastest computer in the store that he can buy.
asked
Dec 29, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.3k
views
By means of suitable diagram, show how a CPU chip is interconnected to an I/O and a main memory in a simple Von Newman computer design bus system
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
2.4k
views
Dial-up modems, HFC, DSL and FTTH are all used for residential access. For each of these access technologies, provide a range of transmission rates and comment on whether the transmission rate is shared or dedicated.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
9.1k
views
Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user or for only some of the objects? Why?
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
669
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
+2
votes
1
answer
20.5k
views
The missionaries and cannibals problem is usually stated as follows. Three missionaries and three cannibals are on one side of a river, along with a boat that can hold one or two people.
asked
Oct 2, 2019
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
455
views
What is the HOL blocking issue in HTTP/1.1? How does HTTP/2 attempt to solve it?
asked
Feb 3
in
Computer Networks
by
anonymous
0
votes
1
answer
8.2k
views
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers for a. The segments sent from A to S.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
119
views
Discuss The Exceptio Non Adimpleti Contract Us With Regard To Its Definition, The Principles Of Reciprocity, How Reciprocity Is To Be Determined, As Well As When The Defence Can Be Raised?
asked
Sep 11, 2021
in
Law for Engineers
by
anonymous
+2
votes
1
answer
607
views
Explain what is meant by the term or phenomenon ‘Register naming’ and show by a sequence of program outline how this is achieved in a computer architecture
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
3.1k
views
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
292
views
Write down the various steps are carried out while transmitting a file/message by a host to another host on the bus?
asked
Aug 27, 2021
in
Computer Networks
by
anonymous
+1
vote
2
answers
991
views
What is the Apache Web server? How much does it cost? What functionality does it currently have? You may want to look at Wikipedia to answer this question.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
855
views
What is the disadvantage of using Nagle's algorithm on a badly congested network?
asked
Apr 13, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
250
views
How many bytes are used to represent the Node ID in a class A network
asked
Nov 22, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.9k
views
Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call must pass through both the Internet and through a telephone network. Discuss how this might be done.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
229
views
A 2 Gbps link supports a maximum of 5000 users under circuit switching. At what rate are the users generating data
asked
Dec 14, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
1.7k
views
What is a private network address? Should a datagram with a private network address ever be present in the larger public Internet? Explain.
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
4.1k
views
How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.2k
views
Explain why the environment in which a computer-based system is installed may have unanticipated effects on the system that lead to system failure.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
6.0k
views
An Ethernet MAC sublayer receives 1510 bytes of data from the LLC layer. Can the data be encapsulated in one frame? If not, how many frames need to be sent? What is the size of the data in each frame?
asked
Sep 24, 2020
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...