Name the protocol responsible for finding the mac address , Computer Networking

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?  

b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases (hub and switch), each port is rated at 100 Mbps. Assume that you use either the hub or the switch to create a small home network of 8 hosts. Which of the two networks (hub-based or switch-based) will be able to achieve a greater total network throughput (the total throughput is defined here as the sum of individual throughputs over all simultaneous communications between the hosts connected to the network)?  Why?  

c)  Name the protocol (i.e. give its well-known acronym and full name) responsible for finding the MAC address of a host from its IP address.

Posted Date: 3/25/2013 6:29:45 AM | Location : United States







Related Discussions:- Name the protocol responsible for finding the mac address , Assignment Help, Ask Question on Name the protocol responsible for finding the mac address , Get Answer, Expert's Help, Name the protocol responsible for finding the mac address Discussions

Write discussion on Name the protocol responsible for finding the mac address
Your posts are moderated
Related Questions
Define the term - Graphics Interchange Format A type of graphics file found frequently on the .net. A picture of a vice-president, for example, may appear on the Intranet as


In distributed data processing, explain two scenarios where vertical partitioning and horizontal partitioning are used. Distributed Data Processing The distributed data pro


How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

Recognize the hardware component used to store buffers, tables, running-configuration etc? Ans) RAM is the dynamic memory area. ROM have the boot strap code, NVRAM have the star

How LANs connected to Internet. Doubling every 18 months means factor of four gains in 3 years. In 9 years, gain is then 43 or 64, which leads to 6.4 billion hosts. My intuitio

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Elaborate the term - Database Connectivity Basic connectivity A number of database management systems are available today such as the Oracle, Sybase, Ingres, etc. Most