Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Problem 1:

Suppose, we have a network in which data transfer requests (or flows) arrive for scheduling at a central server. Suppose that all the requests share a bottleneck link whose capacity is 70+X Mbps (Mega bits per second), where X = (Your roll number) modulus 20. The bottleneck link in the path of a flow is the link with the smallest available capacity. Suppose that the inter-arrival times of the requests (or flows) are exponentially distributed but the data size and the transfer duration of the flows is constant (same for all flows). The minimum required data transfer rate of a flow is obtained by dividing its data size with its transfer duration. The data transfer rate of a flow can increase (if bandwidth is available) during its transfer at any stage. The link is always fully utilized if there is at least one flow using that link. A request is rejected if its required transfer rate is not available at its arrival time.

a) Identify and explain the events that can change the state of the system

b) Suppose the arrival times of the first 10 requests are 1, 3, 5, 6, 7, 8, 11, 12, 14, 15 seconds (of simulation time). The data size of each flow is 180+Y Mega bits, where Y = (Your roll number) modulus 30, and the transfer duration of each flow is 5 seconds. Fill the following table.

153_Change the state of the system.png

Problem 2:

Jobs arrive at a server according to a Poisson input process at a rate of four per day, and the service time has an exponential distribution with a mean of 1/5 per day. Enough-in-process storage space is provided at the server to accommodate five jobs in addition to the one being processed. Determine the percent of time that this storage space will be adequate to accommodate newly arrived jobs.

Problem 3:

Traffic to a message switching center for one of the outgoing communication lines arrive exponentially at an average rate of 220 messages per minute. The line has a transmission rate of 880+B characters per second, where B = (Your roll number) modulus 40. The message length distribution (including control characters) is exponential with an average length of 170 characters. Hence, the service times of messages are also exponentially distributed. Calculate the following principal statistical measures of system performance, assuming that a very large-sized (infinity) message buffer is provided:

(a) Average number of messages in the system
(b) Average number of messages in the queue waiting to be transmitted.
(c) Average time a message spends in the system.
(d) Average time a message waits for transmission
(e) Probability that 10 or more messages are waiting to be transmitted.

Problem 4: Extend (by 10 more rows) and fill the table. Consider two repairmen for the machine-repairman problem.

Operational time of each machine = 6+C units of time, where C = (Your roll number) modulus 3

Repair time for each machine = 6 units of time

CL1, CL2, CL3 are associated with machines 1, 2, 3 respectively

CLR1 and CLR2 tell repairman 1's and 2's completion time respectively

At t=0, all three machines are operational, CL1=2, CL2=5, CL3=5+D units of time, where D = (Your roll number) modulus 3.

880_Change the state of the system1.png

Problem 5: The CDF of exponential distribution is F(x) = 1-e-ax. Write a programming code to generate 100 random variates according to exponential distribution and store them in an array.

Problem 6:

1627_Change the state of the system2.png

The output buffer of an ATM multiplexer can be modeled using a queue. Constant service time means that an ATM cell has a fixed size (53 octets; each octet is of 8 bits) and its transmission time to the link is constant. If the link speed is 155 Mbps, then the transmission time is S = 53* 8/155 μs = 2.7μs. What is the mean number of cells in the buffer (including the cell being transmitted?) and the mean waiting time of the cell in the buffer when the arrival rate on the link is 80+A Mbps, where A = (Your roll number) modulus 20?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91078650

Have any Question?


Related Questions in Computer Network & Security

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Fiona told her friend that she is very fortunate as the

Fiona told her friend that she is very fortunate as the slow-down in the economy has not decreased sales in her grocery store by much compared to sales of new cars in his car dealership. Explain what Fiona meant using th ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As