answersLogoWhite

0


Best Answer

The best-case delay is the time it takes for a signal to travel the round trip of 80,000 km to the satellite and back. Since electromagnetic signals travel at the speed of light, we have the following:

80,000,000 m / 299,792,458 m/s .= 0.267 seconds

User Avatar

Wiki User

15y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

total path =4*400000km

hence time=D/T

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: A A client server system uses a satellite network with the satellite at a height of 40000 km What is the best-case delay in response to a request?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

1 The software component that intercepts a client request for a network resource and forwards it?

1. The software component that intercepts a client request for a network resource and forwards it


Using port forwarding when a firewall receives a request for communication from the Internet to a specific computer and port the request will be allowed and forwarded to that computer on the network?

Port forwarding


What is RFC And what does RFC 822 describe?

RFC stand for "Request for comment" it is method for standard the network thing


What happens when you first connect your computer to a network?

The computer searches for a DHCP (Dynamic Host Control Protocol) server on your network and tries to request a IP (Internet Protocol) address. Once it achieves this process it can communicate with other devices on your network.


What does server monitoring software do?

Network Monitors constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, pager or other alarms) in case of outages. It is a subset of the functions involved in network management. While an intrusion detection system monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices. For example, to determine the status of a webserver, monitoring software may periodically send an HTTP request to fetch a page. For email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3. Commonly measured metrics are response time, availability and uptime, although both consistency and reliability metrics are starting to gain popularity. The widespread addition of WAN optimizationdevices is having an adverse effect on most network monitoring tools -- especially when it comes to measuring accurate end-to-end response time because they limit round trip visibility. Status request failures - such as when a connection cannot be established, it times-out, or the document or message cannot be retrieved - usually produce an action from the monitoring system. These actions vary -- an alarm may be sent (via SMS, email, etc.) to the resident sysadmin, automatic failover systems may be activated to remove the troubled server from duty until it can be repaired, etc. Monitoring the performance of a network uplink is also known as network traffic measurement, and more software is listed there.

Related questions

What is grammatically correct - we are looking forward to your positive response to this request on this request or for this request?

"We are looking forward to your positive response to this request." This is the grammatically correct phrase. "On this request" or "for this request" would not be necessary for conveying the intended meaning.


Http servlet response and http request?

HttpServletRequest and HttpServletResponse are the two objects that signify the request received by a servlet and the response sent by it after it is done processing the request. Both the request and response can carry data objects (variables) that can be accessed by the entity receiving the request/response object. They are both an integral part of J2EE Applications.


What is Request-response paradigm?

request response paradigm is somthiing which define how request and response work in the web application or in real world. First when the user open browser and hit any URL, request object is created. This request object then send to the server. server finds the appropriate resources for that request and executes the logic (if any) ans send back response to the browser. Browser interprets the response and display result


What network component request services across the network?

A client requests services across a network.


What are turnaround time and response time with reference to Operating System?

Turnaround time is the interval between the submission of a job and its completion. Response time is the interval between submission of a request, and the first response to that request.


1 The software component that intercepts a client request for a network resource and forwards it?

1. The software component that intercepts a client request for a network resource and forwards it


Where the icmp request are originated?

icmp request is orginated on the OSI network layer with ip protocol.


What object is used to request data from a form in ASP?

Response


What is the term for the delay in the RAM's response to a request from the MCC?

Latency


Blank layer services facilitate communication between software applications and lower layer network services so that the network can interpret an applications request and in turn the?

The Application Layer is responsible for interfacing a user network request from an application via an API (application Program Interface) with the network stack. This allows an application to not have to know anything about how to do network functionality; it can merely request the network software to do something without worrying about the details.


Hot to use hughes satellite internet?

Hughes satellite internet is easy to use. The company will install it for you. Your computer handles the rest. The computer sends a request to a Hughes satellite and the satellite sends a signal back to the computer and the web page is displayed instantly.


Why there is Request for network password?

For either a personal or a business wireless network, it's to protect it from unauthorized users.