Does node refrain from transmitting its scheduled time

Assignment Help Computer Networking
Reference no: EM1370448

Suppose nodes A and B are on the same 10 Mbps Ethernet bus, and the propagation delay between the two nodes is 245 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide? For our purposes, it suffices to work out the following example. Suppose A and B begin transmission at t=0 bit times. They both detect collisions at t=245 bit times. They finish transmitting a jam signal at t = 245 + 48 = 293 bit times. Suppose KA=0 and KB= 1. At what time does B scheduleits retransmission? At what time does A begin transmission? (Note: The nodes must wait for an idle channel after returning to Step 2, see protocol.) At what time does A's signal reach B? Does B refrain from transmitting at its scheduled time?

Reference no: EM1370448

Previous Q& A

  Calculating loan period

You charged $1,000 on your credit card for Christmas presents. Your credit card firm charges you 16 percent yearly interest, compounded monthly.

  Describe these power - energy drinks

Explain what it contains and whether there may be any negative side effects associated with it. In general, are these energy drinks healthy?

  Long-run aggregate supply curve

The long-run aggregate supply curve is vertical at economy's potential output level. Why is the long-run aggregate supply curve situated at his level of output rather than below or above the potential output level?

  Illustrate results applying deadlock detection algorithm

Illustrate the results applying deadlock detection algorithm to following data. Give proper description for supporting your answer.

  Determine the stock selling price

The stock of ABC Corporation will go ex-dividend tomorrow. The dividend will be $0.50 per share, and there are 20,000 shares of stock outstanding.

  Corporate governance - enron

What else could Enron have done to foster good corporate governance conduct and outline conclusions about Enron's corporate behaviour and make recommendations about appropriate corporate governance in this case.

  What is the firm inverse demand function

Assume you're the manager of Alpha Enterprises, a firm that holds the patent that makes it the exclusive manufacturer of bubble memory chips. Based on the estimates provided by the consultant

  Write select statement which returns three columns

Write a SELECT statement which returns three columns: VendorName, InvoiceCount, and InvoiceSum. InvoiceCount is the count of the number of invoices, and InvoiceSum is the sum of the InvoiceTotal column.

  What constitutes alcohol intoxication

When you take a drink of alcohol - what is the path it takes in the body to cause the effects it does and what factors may determine how "blitzed" you get?

  Finding page faults for lru replacement algorithms

How many page faults would happen for the given replacement algorithms, assuming one, two, three, and four frames?

Reviews

Write a Review

 

Similar Q& A

  Dac system explain how mac system could be implemented

Given a DAC system explain how a MAC system could be "implemented" on top of this DAC system. Explain any problems and assumptions.

  Compute total time required to transfer file

Compute the total time required to transfer a 1000KB file on a 1Mbps link with an RTD of 100msec ans a packet size of 1 KB in the following cases.a).

  Create a network design for training environment

Create a network design which accommodates these requirements and keeps costs down. These training environments a maximum of one instructor and 12 students.

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Advantages-disadvantages of replacing old servers with new

As the data center manager for your organization, you have been asked by the CIO to provide a short presentation on the advantages and disadvantages of replacing old servers with new servers.

  Does vc or datagram architecture have more traffic overhead

Suppose that the links and routers in the network never fail and that routing paths used between all source/destination pairs remains constant. In this scenario, does a VC or datagram architecture have more traffic overhead. Why?

  How company can manage snmp from corporate location

Write one-page proposal of how company can manage SNMP from corporate location. Include details on versions, basic operations, and MIBs. Describe the benefits of this kind of centralized monitoring.

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  How to assign ip addresses to various subnets

Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets?

  Decision-making process to help the company grow

How would you utilize this information in the decision-making process to help the company grow?

  Network ids diagram of lan depiting two new network

Subnet a class C network into subnets using 2 of the resulting new Network IDs Diagram a woring LAN depiting the two newnetworks.

  Relationship-individual characteristics and job satisfaction

What is the relationship between individual characteristics and job satisfaction?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd