Name the protocol responsible for finding the mac address , Computer Networking

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?  

b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases (hub and switch), each port is rated at 100 Mbps. Assume that you use either the hub or the switch to create a small home network of 8 hosts. Which of the two networks (hub-based or switch-based) will be able to achieve a greater total network throughput (the total throughput is defined here as the sum of individual throughputs over all simultaneous communications between the hosts connected to the network)?  Why?  

c)  Name the protocol (i.e. give its well-known acronym and full name) responsible for finding the MAC address of a host from its IP address.

Posted Date: 3/25/2013 6:29:45 AM | Location : United States







Related Discussions:- Name the protocol responsible for finding the mac address , Assignment Help, Ask Question on Name the protocol responsible for finding the mac address , Get Answer, Expert's Help, Name the protocol responsible for finding the mac address Discussions

Write discussion on Name the protocol responsible for finding the mac address
Your posts are moderated
Related Questions
Q. OSI Network Layer Addressing ISO/IEC and CCITT mutually administer the global network addressing domain. The primary hierarchical decomposition of the address is defined

Efficiency of a data communications system depends on three fundamental characteristics - Delivery: The system should deliver data to the correct destination. Data should be r

i have an exam i need it to be solved

Point out the major advantages of Ring Topology. The benefits of ring topologies are: a. They are very simple to troubleshoot because every device incorporates a repeater.

Network Layer and Routing As discussed in previous  chapters the physical  layer  provides   connection sand services to the  data link  layer while the  data link layer is

Elaborate the term - Database Connectivity Basic connectivity A number of database management systems are available today such as the Oracle, Sybase, Ingres, etc. Most

Q. Show the Error Correction by Hamming Code? Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits For i

Question 1: a. What is xDSL and enumerate the benefit of such a technology? b. Name some of the typical applications of xDSL and the different types and standards of xDSL.

Database servers connected as a cluster to the main server There could be three database servers connected as a cluster to the main server to provide better connectivity and se

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i