Solved

Assignment Question

Posted on 1998-11-09
5
430 Views
Last Modified: 2008-03-17
As a possible congestion control mechanism in a subnet using virtual circuits internally, a router cou1d refrain from acknowledging a received packet until (1) it knows its last transmission along the virtual circuit was received successfully and (2) it has a free buffer.  For simplicity, assume that the routers use a stop-and-wait protocol and that each virtual circuit has one buffer dedicated to it for each direction of traffic.  If it takes T sec to transmit a packet (data or acknowledgement) and there are n routers on the path, what is the rate at which packets are delivered to the destination host?  Assume that transmission errors are rare, and that the host-router connection is infinitely fast.
0
Comment
Question by:cbgold
  • 3
5 Comments
 
LVL 2

Accepted Solution

by:
G0LIATH earned 100 total points
ID: 1012335
T*n+1
0
 
LVL 2

Expert Comment

by:G0LIATH
ID: 1012336
Oops I mean
2T*n+T
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1012337
Don't do his homework for him!

M

0
 

Author Comment

by:cbgold
ID: 1012338
I like discussion only.  If you can create an wrong answer that can convince me, you will be a real expert instead of just criticizing on others.  

Besides, do you think that this answer can hand on to the teacher???  ----  very old assignments without answer ....
0
 
LVL 2

Expert Comment

by:G0LIATH
ID: 1012339
A packet is sent from A to B = 1T
B acknowledges reciept       = 1T
A can now send another packet or one packet every 2T
So from computer 1 to computer 2 is 2T times the # of routers n plus T from the last router to computer 2.
Computer 2 recieves the packet 2T*n+T seconds after Computer 1 starts sending.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question