Free Essay

Connection Speed Simulation Report

In:

Submitted By SumoWorks
Words 826
Pages 4
Oscaralexis Rodríguez Justiniano #54406
Report
Connection speed simulations are of great help when determining the best type of connection for your use. There are different types of connections with different speeds and characteristics just as there are different types of users, both at home and at big corporations. The budget they posses is what will determine just how much of a top quality connection they can get.
Download Speed = 20kbps

Utilization averages about 80% for downloads and about 2% for uploads. The high utilization of 80% does not give much available bandwidth for potential new applications or users. The Response Time is in the range of 5 to 7.5 seconds, too much and too long. This slow connection can get overloaded quite easily and would be ideal for personal use in a home.

Download Speed = 40kbps

This connection offers twice the speed of the last connection. Its Utilization averages 42% for downloads and about 2% for uploads. It can be seen in the simulation that twice the speed can mean twice as much bandwidth, or as close as it can get to twice as much bandwidth. Even though there are better sources for higher bandwidth, this particular connection is a decent one for a low budget user. In terms of Response Time, this connection ranges from 2.0 to 2.5 seconds. That’s more than twice the response time seen in the 20kbps connection, meaning that this connection can still be overloaded, but will require a more stern use by an equally stern user.

Download Speed = 512kbps

This DSL connection offers great speed for an average user. Even if the user isn’t of the average type, this type of connection can provide lasting satisfaction for someone who is into downloading content and expecting web pages to load at a faster pace. This connection’s Utilization averages about 4.5% for downloads and about 0.0% for uploads. This percentage demonstrates this connection’s top notch speed and characteristics for, pretty much, any user that isn’t of a corporate level.
It’s Response Time is highly quick at an average of 0.125 to 0.150 seconds. That’s excellent compared to the first two connections. Overloading this connection will require a great deal of medium end downloads and several opening pages before a crash can occur, otherwise the speed will be the only thing that become affected, hopefully not by much.

Download Speed = 1.544Mbps

This type of connection offers speeds comparable to a T1 connection line usually used by users of a corporate level, not your average user. This speed and power comes at a price though. They are expensive and holding one for long terms requires a great deal of money.
You get what you paid for though. This connection’s Utilization for downloads is at 0.1% while its Utilization for uploads stands at a 0.0%. Its Response Time is almost non-existent with an average between 0.04 and 0.05 seconds. Superb speeds with huge bandwidth equals near non-existent clutter and overloading. Pages load almost instantaneously and content download goes quick and smooth as silk.
Recommendations upon Comparisons
Comparing between all the simulated connections and their speeds, bringing an economic element along, is a rather simple task. Taking into consideration the great gap between them, it is safe to say that the results were varied at best. The 20kbps connection is best when speaking about monthly payments. That’s because it is the cheapest of them all, but its output leaves something to be desired and only the neediest of users with minor income would consider this connection, but in this case it just doesn’t work.
Taking this 20kbps connection and comparing it to the 40kbps connection completely takes it out of the equation. This superior connection is slightly more expensive, but offers twice the productivity. Therefore, this 40kbps connection is far more ideal than its slower predecessor.
Now, if you compare the 40kbps connection with a superior 512kbps connection, you get a major upgrade for a modest price. This connection is by far the best deal you can get, balancing both power and price.
Last but not least, the 1.544Mbps connection is a real powerhouse, but such power requires great monetary support. This is not ideal for an average home user with good income. Like stated earlier, this connection is best for corporate use and educational institutions which can afford it and have it satisfy its needs.
To choose one of these connections is not hard. One always wants the best, but is never willing to pay for it. In this case, the best connection to obtain, use, and maintain is the 512kbps connection. One, it is powerful enough to give the user what he is looking for. Two, its price is actually affordable for the working man, even for some students, making this connection the best and most versatile out of all the others.
Recommended connection line – 512kbps. * End of Report

Similar Documents

Free Essay

Wind Power

...Appendix 5.1 Wind power plants with a power output range of 1.5 kW to 25 kW Technical regulation for grid connection TF 3.2.5 Appendix 5.1 Table of contents 1. Terminology and definitions 4 2. Commissioning requirements 5 3. Verification of tolerance of frequency and voltage deviations 6 4. Verification of electricity quality requirements 9 5. Verification of control and monitoring requirements 10 6. Verification of protection requirements 14 7. Verification of data communication requirements 15 To the reader This commissioning report template contains guidelines for implementing a commissioning test to verify that a wind power plant complies with the technical, functional and documentation requirements which wind power plants with a rated output over 1.5 MW and up to 25 MW must comply with when they are connected to the Danish power grid. The report template is published by Energinet.dk and can be downloaded from www.energinet.dk. 1. Terminology and definitions The terminology and definitions used must be specified in this chapter. 2. Commissioning requirements 2.1 Introduction In the following a brief introduction must be given to the commissioning test. The scope of testing (technical tasks and time required) must also be described. Technically, the following must be verified: - Tolerance of frequency and voltage deviations - Electricity quality - Control and monitoring - Protection - Data communication and exchange...

Words: 2259 - Pages: 10

Free Essay

Network Opnet Manual

...Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru’s user-friendly interface with drag-and-drop features enable students to effectively model, manage, and troubleshoot real-world network infrastructures. We investigate application performance and capacity planning, by changing the link speed between a home LAN and its ISP. Overview OPNET’s IT Guru provides a Virtual Network Environment that models the behavior of networks, including its routers, switches, protocols, servers, and individual applications. The Virtual Network Environment allows IT managers, network and system planners, and operation’s staff to more effectively diagnose difficult problems, validate changes before they are implemented, and plan for future scenarios such as traffic growth and network failures. You can do “what if” analyses (called scenarios in IT Guru) on network designs, just as you can on spreadsheets with financial business models. However, instead of looking at “bottom line” financial numbers, you will be looking at how response times, latency (delays) and other network performance measures will change under different network design approaches. To create a network simulation (called a project in IT Guru), you specify the nodes (computers, switches, routers, etc.) in your network, the links between nodes, and the applications that will be running on the nodes. In this exercise, the initial simulation (project)...

Words: 5307 - Pages: 22

Free Essay

Supply Chain Task2

...A1- Explain how you determined your product design decisions in the simulation. In the simulation we had to start a computer company from the ground. Initially, we were given a 2 million dollar investment to start with. We had to choose 2 out of 3 markets in 4 different major cities each with their individual need. We had to design computers that will respond to their needs based on the market report that was provided. We did not have a report or review of our products to rely on to build new computers since we were a new company. Therefore, we analyzed the market research to see what our targeted market wanted and the price they were willing to pay. Then we build computers based on them. Mercedes, a very well-known car company, wants a computers that is fast and powerful, has engineering features and can connect with other computers. In response to their needs, we manufactured the GCS 100, a powerful, fast computer with engineering capacity that can link to other computers. We chose the GCS100 name because it is our acronym plus 100. We added the 100 in case we came with an updated version we can change the number and keep the GCS. After a quarter of deceptive result we decide to stop manufacturing the GCS100 and replaced it with Global Power computers which we later updated to global power 1. Workhorse has the largest market. They wanted an easy and fun to use computer with office application that can link with other computers. Therefore we manufactured the GCS with the...

Words: 1732 - Pages: 7

Premium Essay

Itm 436 Operations Mgmt and Operations Sys.

...The Root Beer Game Simulation John Doe TUI University ITM 436 Operations Mgmt and Operations Sys. John Doe, Ph.D. What I learn about supply chain management during this tutorial? Successful supply chain management is significant to the survival of today’s business. To review supply chain strategies and evaluate proposed changes that impact the business as a hole, supply chain managers should be able to assertively predict their network’s performance under a range of conditions. This apparently impossible task has urged a search for better software to help decision makers analyze the design and operation of their supply chain. Computer simulations have become the tool of choice. Since simulation capture real world system variability, a simulation program helps managers to better understand the supply chain as it presently exists. Most significantly, a simulation gives planners a realistic view of what will happen in their supply chain under conditions that do not currently exist, but might take place. The tutorial presented a distribution network for a root beer beverage. The simulation starts in week 16 of the inventory with 170,000 cases of root beer on backlog. Having product cases on inventory or backlog will add additional expenses to the company (inventory $.50/bottle and Backlog costs $1/bottle). The business objectives include reducing inventory and backlog cost. The simulation project provides managers a tool for supporting strategic supply chain decisions...

Words: 699 - Pages: 3

Premium Essay

System Integrity and Validation

...offer a variety of benefits to Kudler as well as the auditor. The use of CAATs will allow auditors to use the software for improved analysis and application of security. Auditors will also be able to extract and analyze data to foresee any potential threats, trends, fraud issues, or foresee expectations. The use of validation tools will also allow Kudler greater success in their audit. Using test decks, integrated test facilities (ITF), and parallel simulations will allow auditors to verify and test data quickly and effectively. The functions of this software will improve greatly not only the speed of the audit, but also accuracy as well. Auditors will be able to analyze a vast amount of data and verify balances, again information, and verify any duplicate information. Kudler should choose a custom audit software suitable to their organizational needs. More specifically, they should focus on accuracy, reliability, and compliance as their key goals for the audit. The distinct audit software should be in connection with their AIS and will offer numerous benefits. Kudler and the auditor will be able to manage current or past transactions, history, reporting, and foresee audit trails to analyze any issues or errors. System Integrity and Validation Kudler Fine Foods is gourmet food stores with numerous locations along the west coast. Kudler has had success over the past years and with hopes of continued growth, is looking to increase security measures and maximize...

Words: 1144 - Pages: 5

Premium Essay

Dac1

...Porter's Five Forces Supplier Power: Here you assess how easy it is for suppliers to drive up prices. This is driven by the number of suppliers of each key input, the uniqueness of their product or service, their strength and control over you, the cost of switching from one to another, and so on. The fewer the supplier choices you have, and the more you need suppliers' help, the more powerful your suppliers are. Buyer Power: Here you ask yourself how easy it is for buyers to drive prices down. Again, this is driven by the number of buyers, the importance of each individual buyer to your business, the cost to them of switching from your products and services to those of someone else, and so on. If you deal with few, powerful buyers, then they are often able to dictate terms to you. Competitive Rivalry: What is important here is the number and capability of your competitors. If you have many competitors, and they offer equally attractive products and services, then you'll most likely have little power in the situation, because suppliers and buyers will go elsewhere if they don't get a good deal from you. On the other hand, if no-one else can do what you do, then you can often have tremendous strength. Threat of Substitution: This is affected by the ability of your customers to find a different way of doing what you do - for example, if you supply a unique software product that automates an important process, people may substitute by doing the process manually or by outsourcing...

Words: 4647 - Pages: 19

Free Essay

Cryptograph

...learning, and cyberneticists concur. Given the current status of scalable models, scholars daringly desire the construction of SCSI disks that would allow for further study into hierarchical databases, which embodies the private principles of electrical engineering [1]. In this paper we describe a classical tool for simulating reinforcement learning (RUSS), disconfirming that the infamous knowledge-based algorithm for the simulation of telephony by R. Shastri et al. [2] is recursively enumerable. 1 Introduction The transistor must work [3]. In this position paper, we demonstrate the simulation of robots, which embodies the structured principles of algorithms. Along these same lines, while previous solutions to this issue are significant, none have taken the read-write solution we propose in this position paper. Therefore, architecture and the memory bus [4, 5, 6, 7] do not necessarily obviate the need for the simulation of interrupts. Another important ambition in this area is the evaluation of kernels. Contrarily, the simulation of XML might not be the panacea that biologists expected. The basic tenet of this approach is the deployment of Byzantine fault tolerance. The basic tenet of this method is the study of write-ahead logging. We allow I/O automata to request embedded symmetries without the confirmed unification of the World Wide Web and randomized algorithms that made visualizing and possibly enabling virtual machines a reality. This combination ...

Words: 2390 - Pages: 10

Premium Essay

Networking

...Abstract AAS-Design AAS-Design is a North American fashion label specializing in luxury goods for men and women (ready-to-wear, leather accessories, shoes, luggage and hats), founded in 1990 by Abel, Angus and Satish in Virginia Beach, Virginia. Fulana inherited the company in 1995 by which time sales were up to U.S. $450,000. With John alongside her as business manager, Fulana was allowed time to implement her creativity onto design. Initial success was not instant, as they were hard to sell due to the lack of advertising and high-prices, but later become her first commercial hit. Description of technology and Communications Need: IT Department The IT Department is in the third floor of corporate building. From this place the IT department offer supports to the entire corporate building and the rest of the store in U.S. The implementation of news technology indicates the degree of business transformation varies significantly between firms. Improving processes usually involves implementing systems and process management across business function boundaries rather than within functions. IT infrastructure investments can be a constraint where systems are not compatible, or where inconsistent data models have been used in different parts of the business. (Broadbent, M., Weill, P., Clair, Don St, 1999) As companies grow, their IT Infrastructure evolves, requiring additional capacity and process efficiencies. The IT infrastructure required to support a company's operations...

Words: 4651 - Pages: 19

Free Essay

Cis 175 Complete Course Cis175 Complete Course

...CIS 175 Complete Course CIS175 Complete Course Click below link for Answer http://workbank247.com/q/cis-175-complete-course-cis175-complete-course/12262 Discussions CIS 175 Week 1 Discussion "Topologies"  Please respond to the following: Per the text, network topologies are defined both physically and logically. Suppose you had to implement either a full-mesh topology or start topology network on a university campus that has ten (10) buildings. Determine the topology that would you select. Provide two (2) reasons for your choice.    Imagine that you work for a small company with one hundred (100) computers that are not on a network. Your boss comes to you for advice on whether he should implement either a peer-to-peer or client / server network. Recommend one (1) solution for your boss. Justify your recommendation with at least three (3) advantages that your choice would afford over the network that you did not choose. Click below link for Answer http://workbank247.com/q/cis-175-complete-course-cis175-complete-course/12262 CIS 175 Week 2 Discussion "Working with the OSI Model"  Please respond to the following: Industry professionals use mnemonics in order to remember the layers of the OSI model. The most popular mnemonic is "Please Do Not Throw Sausage Pizza Away," with each capital letter representing the word of the OSI, i.e., Please (Physical), Do (Data Link) and so on. Create your own unique sentence that would help you to remember the OSI model. Provide a rationale...

Words: 6200 - Pages: 25

Free Essay

Xerox

...On the Use of Quality of Service in IP over ATM Bruce A. Mah1 bmah@CS.Berkeley.EDU The Tenet Group Computer Science Division University of California at Berkeley Berkeley, CA 94720-1776 (510) 642-8905 (voice) (510) 642-5775 (fax) ABSTRACT The future Internet will very likely include some components based on Asynchronous Transfer Mode (ATM), as well as existing network technologies. This environment produces the possibility of using one of the strengths of ATM (namely, quality-of-service guarantees) to improve the performance of Internet traffic. In this report, we document some of our work in progress on the use of performance-guaranteed ATM virtual circuits to carry IP datagrams. We are currently addressing the implications of various IP-over-ATM strategies on network performance, particularly those aspects relating to quality of service, multiplexing, and virtual circuit management. We are evaluating these performance effects using INSANE, a new object-oriented, discrete-event network simulator. 1 Introduction The construction and deployment of Asynchronous Transfer Mode (ATM) networks are a recent development in the field of computer communications. Integrating this new technology into the existing Internet requires schemes for managing the transmission of IP datagrams over ATM networks. Such schemes ideally will take advantage of the strengths of ATM, such as its capability for supporting quality of service guarantees, while effectively bridging the ...

Words: 7430 - Pages: 30

Premium Essay

Ethical Hacking

...Importance of ethical hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avoid attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical...

Words: 9223 - Pages: 37

Free Essay

Aviation

...School of Innovation, Design and Engineering Bachelor Thesis in Aeronautical Engineering 15 credits, Basic level 300 Investigation of Different Airfoils on Outer Sections of Large Rotor Blades           Authors: Torstein Hiorth Soland and Sebastian Thuné Report code: MDH.IDT.FLYG.0254.2012.GN300.15HP.Ae   Sammanfattning       Vindkraft  står  för  ca  3  %  av  jordens  produktion  av  elektricitet.  I  jakten  på   grönare  kraft,  så  ligger  mycket  av  uppmärksamheten  på  att  få  mer  elektricitet   från  vindens  kinetiska  energi  med  hjälp  av  vindturbiner.     Vindturbiner  har  använts  för  elektricitetsproduktion  sedan  1887  och  sedan  dess   så  har  turbinerna  blivit  signifikant  större  och  med  högre  verkningsgrad.       Driftsförhållandena  förändras  avsevärt  över  en  rotors  längd.  Inre  delen  är  oftast   utsatt  för  mer  komplexa  driftsförhållanden  än  den  yttre  delen.  Den  yttre  delen   har  emellertid  mycket  större  inverkan  på  kraft  och  lastalstring.  Här  är   efterfrågan  på  god  aerodynamisk  prestanda  mycket  stor.     Vingprofiler  för  mitten/yttersektionen ...

Words: 26722 - Pages: 107

Premium Essay

Zigbee Case Study

...Several methods can be used to deter toll violators.Police patrols at toll gates can be highly effective, as being stopped by the police is quite memorable for the violator. A physical barrier, such as a gate arm, ensures that all vehicles passing through the toll booth have paid a toll. Violators are identified immediately, as the barrier will not permit the violator to proceed. However, barriers also force authorized customers, which are the vast majority of vehicles passing through, to slow to a near-stop at the toll gate, negating much of the speed and capacity benefits of electronic tolling. FUTURE WORK We suggest a system for vehicular management for toll deduction and other add on features in which ZigBee chip will be mounted on the customer’s vehicle who will have account maintained with the traffic authorities and toll bridges will be having ZigBee coordinators which will detect the vehicle when it comes to their proximity and deduct the toll amount and allow it to pass through the toll bridge. Also, vehicle to vehicle management like collision detection can be implemented using the same platform.[10]...

Words: 2038 - Pages: 9

Free Essay

334 Lab

...Kumar Lab Partner: DE SILVA T C J Date: 4/24/2012 4:02 PM Lab TA: Reza Lab Section: L6 –Monday 6:30-9:00 PM Integrity Statement: I understand the importance of ethical behavior in engineering practice and the seriousness of plagiarism. I am pleased to confirm that this work is our own independent effort. All of the data processing and graph preparation is our own. We prepared the written text in this report independently and we did not copy the work of anyone else into our report. Signature #1: JEEVAN SUPARMANIAM Lab Manual & Title Sheet | | 5% | MATLAB Development | | 10% | Notebook Review | | 10% | Post Lab Oral Presentation | | 25% | Results | | 25% | Discussion of Results | | 15% | Quality | | 10% | Total Score | | 100% | Objectives Week 1 * To model DC motor velocity as first and second order systems and simulate with Simulink * To simulate PD closed loop controller using Simulink Week 2 * To develop an understanding of the basic Quanser Inc., QuaRC Software servo motor software and hardware setup and connections * To quantify the values of K and τ from the experimental data using the MATLAB curve fitting toolbox and from the time series graph * To develop an understanding of how the system responds to different input signals Week 3 (&4) * To study the transient characteristics of a typical second order system and evaluate model or system responses * To analyze the effects of proportional-, derivative-...

Words: 2499 - Pages: 10

Free Essay

Online Clothing Store

...Report On Online clothing store i Report On Online clothing store Submitted To: Rubaiyat Bin Arif Lecturer, UIU Submitted By: Name | ID | Farshid iftekhar | 111 101 036 | Taufiq Hasan | 111 092 170 | Md. Hassan Siddiquee | 111 072 107 | Noor Ibne Salehin | 111 082 071 | Sec: B Date of submission: 29-12-2012 ii Letter of Transmittal 29th December 2012 Rubaiyat Bin Arif Course Instructor School of Business United International University Subject: Submission of Report on Online clothing store. Dear Sir, With due respect & humble submission, we undertook our term paper under your direct supervision & guidance. As you will notice the report consist about Online clothing store .We have discussed the report on our T-Shirt store. And this has made the report a complete and an extensive one. Therefore, we are confident of the validity of our term paper. If you have any questions or suggestion about the report, we would be happy to oblige for any further clarification. Sincerely, ---------------------------------- Farshid Iftekhar (On behafe of the group) Iii Acknowledgement All praises are due to Almighty Allah who enabled us to complete this report. This report is about “Online clothing store” on the topic we have covered by the basis of the instruction given by the Course Instructor. We would like to express our sincere gratitude & appreciation to our supervisor...

Words: 4229 - Pages: 17