adplus-dvertising
frame-decoration

Question

Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The TCP layer prefixes a 20 byte header to the message. This passes through an intermediate net­work B. The maximum packet size, including 20 byte IP header, in each network is A : 1000 bytes B : 100 bytes C : 1000 bytes The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512 Kbps link (bps = bits per second).
What is the rate at which application data is transferred to host HC? Ignore errors, acknowledgements, and other overheads.

a.

325.5 Kbps

b.

354.5 Kbps

c.

409.6 Kbps

d.

512.0 Kbps

Answer: (b).354.5 Kbps

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The TCP layer prefixes a 20 byte...

Similar Questions

Discover Related MCQs

Q. Which of the following protocol is called as byte-oriented protocol?

Q. If syn = 0 and ack = 1, it indicates

Q. A DNS.....................server gets its data from another DNS server.

Q. The .............................field in the MIME header describes the method used to encode the data.

Q. A client message usually needs ........................ to send mail.

Q. Which one is not a method of HTTP?

Q. Which one of the following is a communication protocol used for email?

Q. Which one of the following statement about email is false?

Q. Which one of the following can be used on the IP network to monitor a router?

Q. Which of the following is true?

Q. Which of the following is not a Block cipher?

Q. In a ................................attack, an intruder comes between two communicating parties, Intercepting and replying to their messages.

Q. A computer crime is

Q. A program that migrates through networks and operating systems by attaching itself to different Programs and databases is a

Q. In RSA.............................in the common factor in both keys?

Q. Programs that come into a computer system disguised as something else are called

Q. Having a(n) .....................................is important to help large Organization continue operating until Normal computer operations.

Q. In what way does a firewall increase the securities of a VPN?

Q. Choose the false one.

Q. There are 15 users communicating to each other. How many pairs of keys are required to authenticate the communications if the symmetric key is used?