Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain about CSMA/CD
It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other station (or stations) as long as transmission medium is free of transmissions from other stations. Stations monitor (listen to) line to determine if line is busy. If the station has a message to send though the line is busy, it waits for an idle condition before sending its message. If two stations transmit at the same instance, a collision takes place. When this happens, station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. Random delay time for every station is different and thus, allows for prioritizing the stations on the network. If successive collisions take place, back off period for each station is doubled. With CSMA/CD stations should contend for the network. A station isn't guaranteed access to network. To detect the occurrence of a collision, a station should be capable of receiving and transmitting simultaneously. CSMA/CD is used by most LANs configured in a bus topology. Ethernet is an example of a LAN which uses CSMA/CD.
What are the languages evolved in the html open standard Even the companies or developers themselves have been affected with such modifications to the open standards since they
What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared
Q. Show the Comparison of ASCII and EBCDIC? EBCDIC is an easier to employ code on punched cards due to BCD compatibility. But ASCII has some of major benefits on EBCDIC. These
Microprocessor have ROM chip because it have instructions to implement data. It have the monitor program which not only include implementation instruction but also interfacing
Blocking and Non-Blocking network In non-blocking networks the route from any free input node to any free output node can always be offered. Crossbar is an best example of non-
Which processing is not a part of Synthesis phase? Ans. Perform LC processing is not a part of Synthesis phase.
Explain the different sub-functions of Process Scheduling. Process scheduling contains the subsequent sub-functions: 1. Scheduling: Chooses the process to be executed next
Types of validation controls provided by ASP.Net There are following types of validation controls provided by ASP.Net: 1. Required Field Validator 2. Compare Validator
In which system field does the name of current gui status is there? The name of the present GUI STATUS is available in the system field SY-PFKEY.
Types of Pipelines: Instructional pipeline It is used where different stages of an instruction fetch and execution take place in a pipeline. Arithmetic pipeline
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd