Finding the length of cable in the lan

Assignment Help Operating System
Reference no: EM1379584

In designing Ethernet, we must make sure that the length of cable in the LAN is shorter than the length of the shortest possible message that can be sent. Otherwise, a collision could go undetected.

a. Suppose that the smallest possible message is sixty-four bytes (including the 33 byte overhead). If we use 10BaseT, how long (in meters) is a 64-byte message? While electricity in the cable travels a bit slower than the speed of light, once you include delays in the electrical equipment in transmitting and receiving the signal, the effective speed is only about 40 million meters per second. (Hint: first calculate the number of seconds it would take to transmit the message then calculate the number of meters the signal would travel in that time, and you have the total length of the message).

b. If we use 10GbE, how long (in meters) is a 64-byte message?

c. The answer in part b is the maximum distance any single cable could run from a switch to one computer in a switched Ethernet LAN. How would you overcome the problem implied by this?

 

Reference no: EM1379584

Questions Cloud

Relational database architecture from a network : Determine what would make a corporation or organization migrate to a relational database architecture from a network or hierarchical architecture?
Discuss technology related ethical issue : Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?
Encoding the data using the generator polynomial : Encode the data bit sequence 10011011100 using the generator polynomial and provide the code word.
Comparison of wireless lan and lan : Assume your local hospital has decided to extend their offices to another department of the building where it is difficult to have cables installed.
Finding the length of cable in the lan : Suppose that the smallest possible message is sixty-four bytes. If we use 10BaseT, how long is a sixty-four byte message?
Objectives of database management systems : Discuss the objectives of database management systems, Integrating databases; sharing information; maintaining integrity; reducing redundancy and enabling database evolution
Difference between an exclusive lock and a shared lock : Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?
Identify various hardware components and network topologies : VaryNet Corporation wishes to create 4-individual offices across the globe. They wish to be able to connect these offices over the internet, and they want to make sure that each network is available to each other,
Analyze concepts of cryptography : You have been asked through the Training Manager to present a lunch and learn seminar on an area within your field of expertise. You select cryptography.

Reviews

Write a Review

Operating System Questions & Answers

  Disk scheduling algorithm

Simulation of Elevator and Shortest Seek Time First

  Intermediate level tasks

Intermediate Level Tasks :  Below is a simple program. It creates 2 threads. The first thread keeps printing out X on the screen, and the second thread keeps printing out O on the screen.

  Multilevel feedback queues and fcfs

What (if any) relation holds between the following pairs of sets of algorithms (a) Priority and SJF (b) Multilevel feedback queues and FCFS

  It assets and intellectual property in opensource

Will IBM's plan to give away some of its IT assets and intellectual property and increase its support of opensource software products like Linux be a successful growth strategy in the "brutally competitive marketplace" in which it operates?

  Discussion on dns for internet operations

Discuss how do you think the DNS is important for internet operations and what would happen if the DNS of your company/orgnization or your provider or root DNS fails?

  Performing the maintenance

A hard drive must be managed to be used most efficiently. This maintenance with deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, discovering and attempting to correct disk failures.

  Implement a basic shell that restricts runtime of processes

Implement a basic shell that restricts the runtime of processes executed from within it. Your shell will read input from the users and execute it as a new process, but if that program runs longer than it should, your shell will kill the process an..

  Difference from a firewall to border security

Discuss why is it important for a firm to have firewalls and border security in place? I know that a firewall is to stop intruders from entering your network but when read on it seems border security is very similar.

  Question about virus defense

Discuss how can an individual machine get infected with the virus you are researching and how does it spread to other equipments?

  Explain the client-server architecture

What are the three different categories of command, support your answer by giving three examples. Give three good reasons, with valid explanation, to justify why partitioning hard disk provides a variety of advantages. Explain the client/server..

  Security of information and data in an organization

The final security measure my company implements well is monitoring internet usage through limiting the access for most workers to search websites that are not related to the company.

  Wireless internet security

Millions of American homes are prepared with wireless networks. Suppose if the network is not made secure, any nearby computer with a wireless card can use network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd