When collision has occurred then how does a host on

Assignment Help Computer Networking
Reference no: EM13621697

When collision has occurred then how does a host on Ethernet Lan know when to transmit, more details explanation need?

1. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.

2.In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.

3. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.

4. You can improve the CSMA/CD network by adding more hubs.

5. After a collision, the station that detected the collision has first priority to resend the lost data.

A. 1 and 3

B. 2 and 4

C. 1,3 and 4

D. 2 and 5

Reference no: EM13621697

Questions Cloud

To prevent gasoline prices from having devastating effects : to prevent gasoline prices from having devastating effects on the economy it has been proposed that all gasoline prices
Water is then isothermally compressed at 15 bar to state 4 : two kilograms of water execute a carnot power cycle inside a piston-cylinder device. during isothermal expansion water
If the firm is evaluating a new investment project that has : organic produce corporation has 6.3 million shares of common stock outstanding 350000 shares of 5.8 percent preferred
Let x0x1x2 be a markov chain with state space 1 2 and : let x0x1x2 be a markov chain with state space 1 2 and transition probabilities given as follows p11 0.3 p12 0.7 p21
When collision has occurred then how does a host on : when collision has occurred then how does a host on ethernet lan know when to transmit more details explanation need?1.
Vedder inc has 5 million shares of common stock outstanding : vedder inc has 5 million shares of common stock outstanding. the current share price is 73 and the book value per share
A cart starts from rest at the top of the tilted track : a cart starts from rest at the top of the tilted track. assume the track is frictionless. the cart passes photogate a
Using the wsj or ibd look up the following stocks general : using the wsj or ibd look up the following stocks general electric ford motors microsoft and intel and answer the
Mass of the balloon fabric may be neglected determine the : you are to design a balloon capable of lifting 200 kilograms the mass of the gas in the balloon must be 200 kilograms

Reviews

Write a Review

Computer Networking Questions & Answers

  Security infrastructure and protocolsapki and pgp are two

security infrastructure and protocolsapki and pgp are two methods for generating and managing public keys for use in

  Developments in adsl broadband technologies

Show practical and theoretical knowledge of LAN/Internet technologies

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

  Beyond the literal meaning write down the broader

beyond its literal meaning what are the broader implications of the clicheacute keeping the family name alive? or has

  Question 1think about a number of wireless devices nodes

question 1think about a number of wireless devices nodes which are connected to the internet via a single access point

  Determine time take to send file between two hosts

Assume two hosts, A and B, are separated by 10,000 kilometers and are connected by direct link of R =1 Mbps. Assume propagation speed over link is 2.5?108 meters/sec .How long does it take to send file, suppose it is sent continuously?

  As a network administrator for a company you want to

as a network administrator for a company you want to configure an ip route between two routers. of static and dynamic

  Divide network in two vlans for clients and server

In your network, you could use layer 3 switch, divide the network in two VLANs, one for clients, another one for  server and route between them using routing capabilities.

  Processor execute between receipt of message

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  I need you to write about optical code division multiple

i need you to write about optical code division multiple access. introduction and overview historical background

  Explain system enforces both blp and biba properties

Integrity SL = security clearance for level L = integrity clearance for level L SC = security category set for cat. C = integrity category set for cat C. Prove that in this system subject can only read and write at his own level.

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd