Colliding signals in a transmission cable

Assignment Help Basic Computer Science
Reference no: EM13829705

Problem:

Suppose two nodes, A and B, are attached to opposite ends of an 800 m cable, and that they each have one frame of 1024 bits (including all headers and preambles) to send to each other. Both nodes attempt to transmit at time t = 0. Suppose there are five repeaters between A and B, each inserting a 20-bit delay. Assume the transmission rate is 10 Mbps, and CSMA/CD with backoff intervals of multiples of 512 bits is used. After the first collision, A draws K = 0 and B draws K = 1 in the exponential backoff protocol after sending the 48-bit jam signal.

a. What is the one-way propagation delay (including repeater delays) between A and B in seconds? Assume that the signal propagation speed is 2*10^8 m/sec.

b. At what time (in seconds) is A's packet completely delivered at B?

c. Now suppose that only A has a packet to send, and that the repeaters are replaced with switches. Suppose that each switch has a 16-bit processing delay in addition to a store-and-forward delay. At what time, in seconds, is A's packet delivered at B?

Note: you must include all the delays occurred according to CSMA/CD protocol.

Additional Information:

This question is from Computer Science as well as particularly to Networking. The question here is about colliding signals in cable and the methods employed to rectify errors caused by this and to transmit information correctly.

Reference no: EM13829705

Questions Cloud

Geometric return : The rate of return on Cherry Jalopies, Inc., stock over the last five years was 15 percent, 11 percent, −5 percent, 4 percent, and 8 percent. What is the geometric return for Cherry Jalopies, Inc.?
Backoff algorithm for contention : Two CSMA/CD stations are each trying to transmit long (multiframe) files. After each frame is sent, they contend for the channel, using the binary exponential backoff algorithm.
Statement review:enternal law : Statement Review:enternal law
What level of sales is she predicting for june : Marcia Almeida works as a sales analyst for a toy manufacturer. She predicts that toy sales will decrease by 20% from May to June. If the amount of the sales decrease is $605,400, what level of sales is she predicting for June? Because of Father's Da..
Colliding signals in a transmission cable : Suppose two nodes, A and B, are attached to opposite ends of an 800 m cable, and that they each have one frame of 1024 bits (including all headers and preambles) to send to each other.
About the promotion and raise : In September, Ricardo Castíllo got a promotion and a raise. Because his monthly expenses did not increase very much, Ricardo was able to save more dollars. He saved $1,070, which was 40% of his new salary. How much was Ricardo's new salary?
Identify at least two factors that vectorcal : Identify at least two factors that VectorCal uses to determine its labor costs for the creation of the navigation system that it is marketing to the government. Specify key reasons why these two factors are important in determining the labor costs fo..
What kind of situations do you prefer or avoid and why : The problem is about Sociology and the problem deals with concepts such as self-concept, self-esteem, self-knowledge, etc. This is about how a person perceives his or her experiences, knowledge, actions and reactions and the perceptions of others a..
Checking parity scheme of packet with bit data : Suppose the information content of a packet is the bit pattern 1011011011101011, and an even parity scheme is being used. What would the value of the checksum field be for the case of a two-dimensional parity scheme?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Develop a plan for at least three types of tests

For this assignment, you will develop a plan for at least 3 types of tests, and describe the quality controls that you plan to perform quality assurance.

  Probability of heavy- normal and light snowfalls

Brenda evaluates the probability of heavy, normal, and light snowfalls as 0.25, 0.6, and 0.15, respectively. So what must be size of the order you would suggest to Brenda? Justify why.

  What is the difference between coupling and cohesion

What is the difference between coupling and cohesion? Which should be minimized and which should be maximized and what complications are imposed if one tries to implement a dynamic list using a traditional homogeneous array?

  Definite versus indefinite loops

Definite versus Indefinite Loops

  Write algorithm to save few new phone numbers

write algorithm to save few new phone numbers in the address book of cell phone. algorithm should work even if there's only one new phone number or several new phone numbers to save. ke sure to handle the scene if the address book is full.

  Explain object-oriented analysis and agile methodologies

Distinguish the object-oriented analysis and create models with structured analysis and design models. Write down Agile Methodologies?

  Return a version of the given array

Return a version of the given array where all the 10's have been removed

  How could a business use information technology

How could a business use information technology to increase switching costs and lock in its customers and suppliers? Use business examples to support your answers

  Difference in tossing a fair coin to get half-and-half hs-ts

When we toss a fair coin, we expect that we get roughly half-and-half Hs and Ts. Of course, this might not happen in general: the question is, how bad can the difference get?

  It will be more difficult for them to create exploits

Security through obscurity...this expression suggests that proprietary software is more secure because it is closed. If hackers cannot see the code, then it will be more difficult for them to create exploits...or so the thinking goes.

  Clarify the difference between vulnerabilities and threats

Summarize the primary vulnerabilities and potential threats that exist for GITI related to the practice of storing sensitive data on laptops. Use your answer to clarify the difference between vulnerabilities and threats.

  What are the primary components

What are the primary components that comprise an Oracle relational database management system? Identify at least 1 Bible verse that explains how we should facilitate relationships with each other. Expound upon this importance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd