Does node refrain from transmitting its scheduled time

Assignment Help Computer Networking
Reference no: EM1370448

Suppose nodes A and B are on the same 10 Mbps Ethernet bus, and the propagation delay between the two nodes is 245 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide? For our purposes, it suffices to work out the following example. Suppose A and B begin transmission at t=0 bit times. They both detect collisions at t=245 bit times. They finish transmitting a jam signal at t = 245 + 48 = 293 bit times. Suppose KA=0 and KB= 1. At what time does B scheduleits retransmission? At what time does A begin transmission? (Note: The nodes must wait for an idle channel after returning to Step 2, see protocol.) At what time does A's signal reach B? Does B refrain from transmitting at its scheduled time?

Reference no: EM1370448

Questions Cloud

Write the program to model simple calculator : Write the program to model the simple calculator. Each data line must consist of next operation to be performed from list below and right operand.
Find effective annual rate of interest : Elizabeth has $35,000 in an investment account, but she wants account to increase to $100,000 in ten years without making any additional contributions to the account.
Determining cartels-profit maximizing outputs : Compute the profit maximizing output produced by each firm. Compute the profits earned by each firm and the cartel.
Foundations of research-examples of bad survey questions : Distinguish among nominal, ordinal, interval, and ratio scales and define criteria for good measurement in research.
Does node refrain from transmitting its scheduled time : Assume nodes A and B are on same 10 Mbps Ethernet bus, and propagation delay between two nodes is 245 bit times. Does B refrain from transmitting at its scheduled time?
Calculating loan period : You charged $1,000 on your credit card for Christmas presents. Your credit card firm charges you 16 percent yearly interest, compounded monthly.
Describe these power - energy drinks : Explain what it contains and whether there may be any negative side effects associated with it. In general, are these energy drinks healthy?
Long-run aggregate supply curve : The long-run aggregate supply curve is vertical at economy's potential output level. Why is the long-run aggregate supply curve situated at his level of output rather than below or above the potential output level?
Illustrate results applying deadlock detection algorithm : Illustrate the results applying deadlock detection algorithm to following data. Give proper description for supporting your answer.

Reviews

Write a Review

Computer Networking Questions & Answers

  Subnetting mask

Suppose a subnet with prefix 128.119.40.128/26. Provide an example of one IP address (of the form xxx.xxx.xxx.xxx) which can be allocated to this network.

  Drawing map of devices and connections internal lan

Now that you know more about ConnectSpree's network, you begin drawing a map of its devices and connections, starting with its internal LAN.

  Program to accept bit string and generates unipolar encoding

Write program to accept a bit string and generates the unipolar, NRZ and Manchester encodings for the bit string. You can use any programming language/platform and generate the output in any appropriate manner.

  Establishing own world-wide satellite radio infrastructure

An entrepreneur is interested in establishing her own world-wide satellite radio infrastructure and has requested your help. Describe and justify the infrastructure that you would develop.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Which protocol is used to avoid defeat

You and Luke Sky Walker are commanders in rebel army preparing to attack Darth Vader and his Death Star. Is there protocol which you and Luke can use to avoid defeat? If not, describe why not.

  Small internet works

Prepare a network simulation

  Determine the ip addresses of google and yahoo

Determine the IP addresses of www.google.com and www.yahoo.com. Modify hosts file to map www.google.com to yahoo's IP address and try to do google search. Remove modification to host file and repeat.

  Ipv6 give operational improvement-increased address space

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space?

  Pros and cons of long distances agreements

The telephone communication systems and long distances agreements are managed by a telecommunications department in the headquarters that reports to the vice president of finance. Outline pros and cons of both alternatives.

  Describe relative speed of lans used at each location

Describe how relative speed of 100BaseT LANs used at each location compares to accessing WAN link between two sites.

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd