Bus collision avoidance protocol

Assignment Help Computer Engineering
Reference no: EM1321671

Before effective Ethernet switching existed, some network designers are used an alternative bus collision avoidance protocol termed as the token bus protocol. With the token bus protocol, a ‘‘token’’ made up of the short, standard string of 1s and 0s was circulated consistently in the round robin fashion among Network Interface Units (NIUs) attached to the bus. NIUs did not hold token; they simply passed it without any delay to the next NIU in the chain. An NIU was only enabled to keep the message on bus when it possessed the token. After message was delivered, the token was again placed into the circulation.  No NIU was allowed to utilize the token again until token had circulated to every other NIU at least once.

a) Explain under what conditions should this protocol carry out more satisfactorily in comparison to the CSMA/CD? Describe.

Reference no: EM1321671

Questions Cloud

Context of contract law for dealership : What do you think about this situation? Should parties to a sales contract be able to rescind a contract because of mutual mistake of fact? Why or why not? Did either party act unethically in this case?
Elucidate which would be farther to the right : If you were to draw the two nations' PPF's on the same graph, elucidate which would be farther to the right.
Telecommunications planning model : Discuss how to utilize the telecommunications planning model in detail and also explain the significance of the strategic management in order to support this model.
Determine the test value : Mauricio Cruz, a wine merchant for Cruz's Spirits Emporium, wants to determine if the average price of imported wine is less than the average price of domestic wine.
Bus collision avoidance protocol : Before effective Ethernet switching existed, some network designers are used an alternative bus collision avoidance protocol termed as the token bus protocol.
Compute the point cost elasticity of demand : Compute the (point) cost elasticity of demand when cost is $700. Is demand elastic or inelastic.
Primary reason of gender discrimination : Write TWO PAGE about your position on Is gender discrimination the primary reason why men are paid more than women for the same position?
Difference between the two treatments : Her results (in hours until turning a particular shade of brown) are in the table below. At ∞= .01, did she see a difference between the two treatments?
Determining probability of selecting sample with mean : Determine the probability of selecting sample with a mean of more than $100,000 but less than $112,000.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd