Describe what is slot time

Assignment Help Operating System
Reference no: EM13948476

1) How long does it take for a 9.5 Mbyte file to be uploaded to a file server using a broadband connection at 2.2 Mbit/s?

Choose the nearest to the correct value from the options listed below.

A) 4 s

B) 9 s

C) 17 s

D) 18 s

E) 34 s

F) 36 s

2) How many links are required to join together 150 network elements, if they are connected using a fully meshed topology?

A) 150

B) 300

C) 4 500

D) 11 125

E) 22 250

F) 45 000

3) A signal takes 4.5 µs to travel from node A to node B. Given a speed of propagation of 1.77x 10^8 m/s, what is the distance between the two nodes? Choose the nearest to the correct value from the options listed below.

A) 25 m

B) 40 m

C) 80 m

D) 250 m

E) 400 m

F) 800 m

4)A round trip delay of 46 µs is measured in a 3.6 km link. Given that any repeater used in the link will be of the same type and that each repeater introduces a 3µs delay, calculate how many repeaters, if any, are used in the link. Use a propagation velocity of 1.77x108 m/s.

A) None

B) 1 repeater

C) 2 repeaters

D) 3 repeaters

E) 4 repeaters

F) 5 repeaters

5)Which two of the following statements accurately describe slot time?

A) Slot time is measured in microseconds (µs).

B) Slot time is a measure of the time a computer keeps sensing the channel to ensure no collisions have occurred.

C)Slot time is independent of network speed.

D)An increase in maximum segment length will result in a decrease in slot time.

E)Slot time defines a lower limit on frame length if collisions are to be detected.

F)Slot time is dependent on frame length.

6)Complete the following sentence by identifying the missing words from the list below:
_________ is a term used to describe a private network that an organization could extend to its suppliers to facilitate _________ communication.

● A) B2B, internet

● B) extranet B2B

● C) extranet B2C

● D) B2B,B2C

● E) intranet B2B

● F) internet, B2C

7)Which of the following statements about standards and protocols are true?

A)CSMA/CD is a protocol that is used to provide fair access to users on a LAN.

B)All standardizing bodies are government organizations.

C)Network protocols are rules that govern the way data is transmitted on a network.

D)SNMP is a protocol that is used to detect errors in data packets.

E)UDP is a protocol used in the transportation of data packets where flow control and sequencing is critical.

F)RFC's are private documents that record the minutes of all official standards discussions.

8)Which two of the following statements concerning the TCP/IP protocol family are true?

A)In a connectionless service each packet in a session could take a different route.

B)IP guarantees error-free transportation between source and destination application layers.

C)In OSI layered architecture terms, TCP operates in the nework layer.

D)The TCP header includes data to assist in the flow control of packets.

E)UDP and TCP both sit in the layer above IP and are therefore both connectionless protocols.

F)TCP runs on the top of application layer protocols like HTTP and SNMP.

Reference no: EM13948476

Questions Cloud

Prepare performance report for westcotts manufacturing costs : Prepare a performance report for Westcott's manufacturing costs in 2008. A total of 10,000 units will be produced during the year. Calculate the budgeted unit manufacturing cost.
Hypotheses are created before the data is examined : In statistics, usually hypotheses are created before the data is examined. However, in today's high data output environment, many findings may be examined further after the data is analyzed. Do you think that it is a good approach to generate such hy..
Calculate marginal rate of substitution : Suppose your utility over donuts (D) and sodas (S) is given by U(D, S) = D0.5S0.5 + 10. Calculate the marginal rate of substitution (MRS) between donuts and sodas
Are a and b independent : Nine children are seated at random in three rows of three desks. Let A = "Al and Bobby sit in the same row" and B = "Al and Bobby both sit at one of the four corner desks." Are A and B independent
Describe what is slot time : A signal takes 4.5 µs to travel from node A to node B. Given a speed of propagation of 1.77x 10^8 m/s, what is the distance between the two nodes? Choose the nearest to the correct value from the options listed below.
Solve the system by row-reducing the corresponding : Solve the system by row-reducing the corresponding augmented matrix. (Enter your answers as a comma-separated list. If the system is inconsistent, enter INCONSISTENT. If the system is dependent, enter DEPENDENT.)
What''s the probability of finding the right key in the first : There are 10 keys and only one of them can open a lock. We do not know which key can open the lock, but we will try them one by one until we find the right key. We record the keys which we have already tried.  a. What's the probability of finding th..
Which of the following best exemplifies globalizations : Which of the following is an opportunity presented by globalizations? Which of the following BEST exemplifies globalizations
Work for gto broadband industries : You work for GTO Broadband Industries, a business that offers rural broadband Internet service and network server management. One of your jobs at the company is to present the company's services to local government and community meetings. Your b..

Reviews

Write a Review

Operating System Questions & Answers

  What is the difference between ipc and rpc

What are the main features of processes and what information is included in PCB - Why is process cooperation supported in modern operating systems - Explain the terms at most once and exactly once, and indicate how these terms relate to remote proced..

  Designing phase of the project management life cycle

Discuss how does the design phase of the project management life cycle differ in content and importance from the other phases?

  Six of the best practices should be general practices

The management team for MWS has asked for a simple but thorough checklist describing best practices for securing the operating systems used in the company. Six of the best practices should be general practices

  Analyze the security features of linux

Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response

  How are shared memory message passing rpc and sockets

How are shared memory, message passing, RPC, sockets, and pipes implemented practically in systems such as POSIX, Mach, and Windows?

  Does the method work if there is a single cpu switches

Does this method work if There is a single CPU that switches between processes every 100 msec and Two CPUs share a common memory in which the semaphore is located?

  Describe a simple rule for determining a particular request

Describe a simple rule for determining whether a particular request can be satisfied without causing deadlock given the current allocation of chopsticks to philosophers.

  Versions of unix

Early versions of UNIX were available only with a command-driven interface. In more recent years, graphical user interfaces have become popular. Explain in your own words why these GUIs made an impact on the popularity of this operating system.

  Question 1a give three advantages of parallel systemb

question 1a give three advantages of parallel systemb explain what is symmetric multiprocessing and asymmetric

  What do you think would be a "safe" inventory level

What are the benefits of the just-in-time inventory management sys- tem to Carle's Cath Lab?

  Perform necessary error checking to ensure that a positive

Write a C program using the fork() system call that generates this sequence in the child process. The starting number will be provided from the command line. For example

  Fragmentation on a storage device

Fragmentation on a storage device could be eliminated by re-compaction of the information. Typical disk devices do not have relocation or base registers (such as are used when memory is to be compacted)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd