Name the protocol responsible for finding the mac address , Computer Networking

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?  

b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases (hub and switch), each port is rated at 100 Mbps. Assume that you use either the hub or the switch to create a small home network of 8 hosts. Which of the two networks (hub-based or switch-based) will be able to achieve a greater total network throughput (the total throughput is defined here as the sum of individual throughputs over all simultaneous communications between the hosts connected to the network)?  Why?  

c)  Name the protocol (i.e. give its well-known acronym and full name) responsible for finding the MAC address of a host from its IP address.

Posted Date: 3/25/2013 6:29:45 AM | Location : United States







Related Discussions:- Name the protocol responsible for finding the mac address , Assignment Help, Ask Question on Name the protocol responsible for finding the mac address , Get Answer, Expert's Help, Name the protocol responsible for finding the mac address Discussions

Write discussion on Name the protocol responsible for finding the mac address
Your posts are moderated
Related Questions
The LAN switch copies the whole frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and verifies the outgoing interface

Ku-BAND EARTH STATION This is most recent on-going project under which 40 remote sites will be installed for CDMA back haul and 60 sites will be installed for GSM back haul. 4

Q. Show the Error Correction by Hamming Code? Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits For i

Question: a) Briefly describe the purpose of Windows Powershell? b) Name ways software can be installed on Linux? c) What is an interrupt request? d) As the Networ

Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other


You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Q. Working of  TCP - buffers? TCP - buffers Sending & receiving buffers - Processes don't consume data at the same speed Sending site: - White section: unfilled