Question

A video conference call generates 960 Kbps of traffic. How many bytes of a DS-1 frame...

A video conference call generates 960 Kbps of traffic. How many bytes of a DS-1 frame must be used for the transmission of the above 960 Kbps video conference call? If this video call lasts 6 minutes, then what is the total number of bytes that will be transmitted by this video-conference call? You must briefly explain, how did you derive your answers.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

* Generated traffic by video conference call = 960kbps

* A DS1 telecommunication circuit multiplexes 24 DS0s. The twenty-four DS0s tested 8,000 times each second (one 8bit PCM sample from each DSO per DS1 outline) expend 1.536 Mbit/s of bandwidth. One confining piece includes 8 kbit/s of overhead, for a sum of 1.544 Mbps, determined as pursues:

so 960K * 1.54M = 1.44Tbps

* If this video call lasts for 6 minutes then the total number of bytes that will transmitted by this call will be:

1 byte = 8 bits. so 960kbits = 120kbytes.

If the call is for 6 minutes (360 secs) . Then total number of bytes transmitted will be 120kbytes * 360 = 43.2Mbytes .

Add a comment
Know the answer?
Add Answer to:
A video conference call generates 960 Kbps of traffic. How many bytes of a DS-1 frame...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • please use python and provide run result, thank you! click on pic to make it bigger...

    please use python and provide run result, thank you! click on pic to make it bigger For this assignment you will have to investigate the use of the Python random library's random generator function, random.randrange(stop), randrange produces a random integer in the range of 0 to stop-1. You will need to import random at the top of your program. You can find this in the text or using the online resources given in the lectures A Slot Machine Simulation Understand...

  • Data Analysis Project Part 1 Custom Fabric Ventures is a small company that produces fabric-based wardrobe...

    Data Analysis Project Part 1Custom Fabric Ventures is a small company that produces fabric-based wardrobe accessories (such as, handbags, scarves, and headbands) and home accessories (such as placemats, pillows, and window treatments).   The company keeps a limited number of popular items in stock, but primarily produces custom orders. Customers are able to choose from a wide selection of styles, sizes, and fabrics for each type of product. Most of the company’s customers are small boutiques, home décor shops, and home-decorators...

  • internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3...

    internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3 carefully. Then write concise answers to the following questions regarding the internal control system of Duarf, Inc. Clearly label your responses with proper headings and subheadings. Be very specific and precise. Answers that appear to be beating around the bush will not get any credit. 1. What are the controls in place that under normal conditions should function well to prevent embezzlements or frauds?...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • Grignard reagent THE GRIGNARD REAGENT-PREPARATION AND REACTION In this experiment, you will prepa...

    i need help with the postlab questions please Grignard reagent THE GRIGNARD REAGENT-PREPARATION AND REACTION In this experiment, you will prepare a Grignard reagent, phenyl magnesium bromide, from bromobenzene and magnesium metal. The Grignard reagent will then react with methyl benzoate to form triphenylmethanol. Introduction Grignard reagents, such as organomagnesium halides, were discovered in 1910 by French chemist Victor Grignard. The Grignard reaction is one of the most general methods for carbon- carbon bond formation in all of organic chemistry....

  •   1. When it comes to financial matters, the views of Aristotle can be stated as:...

      1. When it comes to financial matters, the views of Aristotle can be stated as: a. usury is nature’s way of helping each other. b. the fact that money is barren makes it the ideal medium of exchange. c. charging interest is immoral because money is not productive. d. when you lend money, it grows more money. e. interest is too high if it can’t be paid back.  2. Since 2008, when the monetary base was about $800 billion,...

  • Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241...

    Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241 through 246). Question 2 Prepare a plan for the remainder of the project in response to Adams’ memo (lines 241 through 246). Your answers to the above will be assessed in terms of the level of communication displayed, the insights and inferences drawn, and your ability to...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT